p2p.c revision 04abaa93653bcee36d59576c90f283d4efdb0a64
1/*
2 * Wi-Fi Direct - P2P module
3 * Copyright (c) 2009-2010, Atheros Communications
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9#include "includes.h"
10
11#include "common.h"
12#include "eloop.h"
13#include "common/ieee802_11_defs.h"
14#include "common/ieee802_11_common.h"
15#include "common/wpa_ctrl.h"
16#include "wps/wps_i.h"
17#include "p2p_i.h"
18#include "p2p.h"
19
20
21static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx);
22static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev);
23static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
24				     const u8 *sa, const u8 *data, size_t len,
25				     int rx_freq);
26static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
27				      const u8 *sa, const u8 *data,
28				      size_t len);
29static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx);
30static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx);
31
32
33/*
34 * p2p_scan recovery timeout
35 *
36 * Many drivers are using 30 second timeout on scan results. Allow a bit larger
37 * timeout for this to avoid hitting P2P timeout unnecessarily.
38 */
39#define P2P_SCAN_TIMEOUT 35
40
41/**
42 * P2P_PEER_EXPIRATION_AGE - Number of seconds after which inactive peer
43 * entries will be removed
44 */
45#ifdef ANDROID_P2P
46#define P2P_PEER_EXPIRATION_AGE 30
47#else
48#define P2P_PEER_EXPIRATION_AGE 300
49#endif
50
51#define P2P_PEER_EXPIRATION_INTERVAL (P2P_PEER_EXPIRATION_AGE / 2)
52
53#ifdef ANDROID_P2P
54int p2p_connection_in_progress(struct p2p_data *p2p)
55{
56	int ret = 0;
57
58	switch (p2p->state) {
59		case P2P_CONNECT:
60		case P2P_CONNECT_LISTEN:
61		case P2P_GO_NEG:
62		case P2P_WAIT_PEER_CONNECT:
63		case P2P_WAIT_PEER_IDLE:
64		case P2P_PROVISIONING:
65		case P2P_INVITE:
66		case P2P_INVITE_LISTEN:
67			ret = 1;
68			break;
69
70		default:
71			wpa_printf(MSG_DEBUG, "p2p_connection_in_progress state %d", p2p->state);
72			ret = 0;
73	}
74
75	return ret;
76}
77#endif
78
79static void p2p_expire_peers(struct p2p_data *p2p)
80{
81	struct p2p_device *dev, *n;
82	struct os_time now;
83	size_t i;
84
85	os_get_time(&now);
86	dl_list_for_each_safe(dev, n, &p2p->devices, struct p2p_device, list) {
87		if (dev->last_seen.sec + P2P_PEER_EXPIRATION_AGE >= now.sec)
88			continue;
89
90		if (p2p->cfg->go_connected &&
91		    p2p->cfg->go_connected(p2p->cfg->cb_ctx,
92					   dev->info.p2p_device_addr)) {
93			/*
94			 * We are connected as a client to a group in which the
95			 * peer is the GO, so do not expire the peer entry.
96			 */
97			os_get_time(&dev->last_seen);
98			continue;
99		}
100
101		for (i = 0; i < p2p->num_groups; i++) {
102			if (p2p_group_is_client_connected(
103				    p2p->groups[i], dev->info.p2p_device_addr))
104				break;
105		}
106		if (i < p2p->num_groups) {
107			/*
108			 * The peer is connected as a client in a group where
109			 * we are the GO, so do not expire the peer entry.
110			 */
111			os_get_time(&dev->last_seen);
112			continue;
113		}
114
115#ifdef ANDROID_P2P
116		/* If Connection is in progress, don't expire the peer
117		*/
118		if (p2p_connection_in_progress(p2p))
119			continue;
120#endif
121
122		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Expiring old peer "
123			"entry " MACSTR, MAC2STR(dev->info.p2p_device_addr));
124#ifdef ANDROID_P2P
125		/* SD_FAIR_POLICY: Update the current sd_dev_list pointer to next device */
126		if(&dev->list == p2p->sd_dev_list)
127			p2p->sd_dev_list = dev->list.next;
128#endif
129		dl_list_del(&dev->list);
130		p2p_device_free(p2p, dev);
131	}
132}
133
134
135static void p2p_expiration_timeout(void *eloop_ctx, void *timeout_ctx)
136{
137	struct p2p_data *p2p = eloop_ctx;
138	p2p_expire_peers(p2p);
139	eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
140			       p2p_expiration_timeout, p2p, NULL);
141}
142
143
144static const char * p2p_state_txt(int state)
145{
146	switch (state) {
147	case P2P_IDLE:
148		return "IDLE";
149	case P2P_SEARCH:
150		return "SEARCH";
151	case P2P_CONNECT:
152		return "CONNECT";
153	case P2P_CONNECT_LISTEN:
154		return "CONNECT_LISTEN";
155	case P2P_GO_NEG:
156		return "GO_NEG";
157	case P2P_LISTEN_ONLY:
158		return "LISTEN_ONLY";
159	case P2P_WAIT_PEER_CONNECT:
160		return "WAIT_PEER_CONNECT";
161	case P2P_WAIT_PEER_IDLE:
162		return "WAIT_PEER_IDLE";
163	case P2P_SD_DURING_FIND:
164		return "SD_DURING_FIND";
165	case P2P_PROVISIONING:
166		return "PROVISIONING";
167	case P2P_PD_DURING_FIND:
168		return "PD_DURING_FIND";
169	case P2P_INVITE:
170		return "INVITE";
171	case P2P_INVITE_LISTEN:
172		return "INVITE_LISTEN";
173	case P2P_SEARCH_WHEN_READY:
174		return "SEARCH_WHEN_READY";
175	default:
176		return "?";
177	}
178}
179
180
181u16 p2p_get_provisioning_info(struct p2p_data *p2p, const u8 *addr)
182{
183	struct p2p_device *dev = NULL;
184
185	if (!addr || !p2p)
186		return 0;
187
188	dev = p2p_get_device(p2p, addr);
189	if (dev)
190		return dev->wps_prov_info;
191	else
192		return 0;
193}
194
195
196void p2p_clear_provisioning_info(struct p2p_data *p2p, const u8 *addr)
197{
198	struct p2p_device *dev = NULL;
199
200	if (!addr || !p2p)
201		return;
202
203	dev = p2p_get_device(p2p, addr);
204	if (dev)
205		dev->wps_prov_info = 0;
206}
207
208
209void p2p_set_state(struct p2p_data *p2p, int new_state)
210{
211	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: State %s -> %s",
212		p2p_state_txt(p2p->state), p2p_state_txt(new_state));
213	p2p->state = new_state;
214}
215
216
217void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec)
218{
219	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
220		"P2P: Set timeout (state=%s): %u.%06u sec",
221		p2p_state_txt(p2p->state), sec, usec);
222	eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
223	eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL);
224}
225
226
227void p2p_clear_timeout(struct p2p_data *p2p)
228{
229	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear timeout (state=%s)",
230		p2p_state_txt(p2p->state));
231	eloop_cancel_timeout(p2p_state_timeout, p2p, NULL);
232}
233
234
235void p2p_go_neg_failed(struct p2p_data *p2p, struct p2p_device *peer,
236		       int status)
237{
238	struct p2p_go_neg_results res;
239	p2p_clear_timeout(p2p);
240	p2p_set_state(p2p, P2P_IDLE);
241	if (p2p->go_neg_peer)
242		p2p->go_neg_peer->wps_method = WPS_NOT_READY;
243	p2p->go_neg_peer = NULL;
244
245	os_memset(&res, 0, sizeof(res));
246	res.status = status;
247	if (peer) {
248		os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr,
249			  ETH_ALEN);
250		os_memcpy(res.peer_interface_addr, peer->intended_addr,
251			  ETH_ALEN);
252	}
253	p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
254}
255
256
257static void p2p_listen_in_find(struct p2p_data *p2p)
258{
259	unsigned int r, tu;
260	int freq;
261	struct wpabuf *ies;
262
263	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
264		"P2P: Starting short listen state (state=%s)",
265		p2p_state_txt(p2p->state));
266
267	freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
268				   p2p->cfg->channel);
269	if (freq < 0) {
270		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
271			"P2P: Unknown regulatory class/channel");
272		return;
273	}
274
275	os_get_random((u8 *) &r, sizeof(r));
276	tu = (r % ((p2p->max_disc_int - p2p->min_disc_int) + 1) +
277	      p2p->min_disc_int) * 100;
278
279	p2p->pending_listen_freq = freq;
280	p2p->pending_listen_sec = 0;
281	p2p->pending_listen_usec = 1024 * tu;
282
283	ies = p2p_build_probe_resp_ies(p2p);
284	if (ies == NULL)
285		return;
286
287	if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, 1024 * tu / 1000,
288		    ies) < 0) {
289		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
290			"P2P: Failed to start listen mode");
291		p2p->pending_listen_freq = 0;
292	}
293	wpabuf_free(ies);
294}
295
296
297int p2p_listen(struct p2p_data *p2p, unsigned int timeout)
298{
299	int freq;
300	struct wpabuf *ies;
301
302	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
303		"P2P: Going to listen(only) state");
304
305	freq = p2p_channel_to_freq(p2p->cfg->country, p2p->cfg->reg_class,
306				   p2p->cfg->channel);
307	if (freq < 0) {
308		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
309			"P2P: Unknown regulatory class/channel");
310		return -1;
311	}
312
313	p2p->pending_listen_freq = freq;
314	p2p->pending_listen_sec = timeout / 1000;
315	p2p->pending_listen_usec = (timeout % 1000) * 1000;
316
317	if (p2p->p2p_scan_running) {
318		if (p2p->start_after_scan == P2P_AFTER_SCAN_CONNECT) {
319			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
320				"P2P: p2p_scan running - connect is already "
321				"pending - skip listen");
322			return 0;
323		}
324		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
325			"P2P: p2p_scan running - delay start of listen state");
326		p2p->start_after_scan = P2P_AFTER_SCAN_LISTEN;
327		return 0;
328	}
329
330	ies = p2p_build_probe_resp_ies(p2p);
331	if (ies == NULL)
332		return -1;
333
334	if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
335		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
336			"P2P: Failed to start listen mode");
337		p2p->pending_listen_freq = 0;
338		wpabuf_free(ies);
339		return -1;
340	}
341	wpabuf_free(ies);
342
343	p2p_set_state(p2p, P2P_LISTEN_ONLY);
344
345	return 0;
346}
347
348
349static void p2p_device_clear_reported(struct p2p_data *p2p)
350{
351	struct p2p_device *dev;
352	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list)
353		dev->flags &= ~P2P_DEV_REPORTED;
354}
355
356
357/**
358 * p2p_get_device - Fetch a peer entry
359 * @p2p: P2P module context from p2p_init()
360 * @addr: P2P Device Address of the peer
361 * Returns: Pointer to the device entry or %NULL if not found
362 */
363struct p2p_device * p2p_get_device(struct p2p_data *p2p, const u8 *addr)
364{
365	struct p2p_device *dev;
366	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
367		if (os_memcmp(dev->info.p2p_device_addr, addr, ETH_ALEN) == 0)
368			return dev;
369	}
370	return NULL;
371}
372
373
374/**
375 * p2p_get_device_interface - Fetch a peer entry based on P2P Interface Address
376 * @p2p: P2P module context from p2p_init()
377 * @addr: P2P Interface Address of the peer
378 * Returns: Pointer to the device entry or %NULL if not found
379 */
380struct p2p_device * p2p_get_device_interface(struct p2p_data *p2p,
381					     const u8 *addr)
382{
383	struct p2p_device *dev;
384	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
385		if (os_memcmp(dev->interface_addr, addr, ETH_ALEN) == 0)
386			return dev;
387	}
388	return NULL;
389}
390
391
392/**
393 * p2p_create_device - Create a peer entry
394 * @p2p: P2P module context from p2p_init()
395 * @addr: P2P Device Address of the peer
396 * Returns: Pointer to the device entry or %NULL on failure
397 *
398 * If there is already an entry for the peer, it will be returned instead of
399 * creating a new one.
400 */
401static struct p2p_device * p2p_create_device(struct p2p_data *p2p,
402					     const u8 *addr)
403{
404	struct p2p_device *dev, *oldest = NULL;
405	size_t count = 0;
406
407	dev = p2p_get_device(p2p, addr);
408	if (dev)
409		return dev;
410
411	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
412		count++;
413		if (oldest == NULL ||
414		    os_time_before(&dev->last_seen, &oldest->last_seen))
415			oldest = dev;
416	}
417	if (count + 1 > p2p->cfg->max_peers && oldest) {
418		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
419			"P2P: Remove oldest peer entry to make room for a new "
420			"peer");
421#ifdef ANDROID_P2P
422		/* SD_FAIR_POLICY: Update the current sd_dev_list pointer to next device */
423		if(&oldest->list == p2p->sd_dev_list)
424			p2p->sd_dev_list = oldest->list.next;
425#endif
426		dl_list_del(&oldest->list);
427		p2p_device_free(p2p, oldest);
428	}
429
430	dev = os_zalloc(sizeof(*dev));
431	if (dev == NULL)
432		return NULL;
433	dl_list_add(&p2p->devices, &dev->list);
434	os_memcpy(dev->info.p2p_device_addr, addr, ETH_ALEN);
435
436	return dev;
437}
438
439
440static void p2p_copy_client_info(struct p2p_device *dev,
441				 struct p2p_client_info *cli)
442{
443	os_memcpy(dev->info.device_name, cli->dev_name, cli->dev_name_len);
444	dev->info.device_name[cli->dev_name_len] = '\0';
445	dev->info.dev_capab = cli->dev_capab;
446	dev->info.config_methods = cli->config_methods;
447	os_memcpy(dev->info.pri_dev_type, cli->pri_dev_type, 8);
448	dev->info.wps_sec_dev_type_list_len = 8 * cli->num_sec_dev_types;
449	os_memcpy(dev->info.wps_sec_dev_type_list, cli->sec_dev_types,
450		  dev->info.wps_sec_dev_type_list_len);
451}
452
453
454static int p2p_add_group_clients(struct p2p_data *p2p, const u8 *go_dev_addr,
455				 const u8 *go_interface_addr, int freq,
456				 const u8 *gi, size_t gi_len)
457{
458	struct p2p_group_info info;
459	size_t c;
460	struct p2p_device *dev;
461
462	if (gi == NULL)
463		return 0;
464
465	if (p2p_group_info_parse(gi, gi_len, &info) < 0)
466		return -1;
467
468	/*
469	 * Clear old data for this group; if the devices are still in the
470	 * group, the information will be restored in the loop following this.
471	 */
472	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
473		if (os_memcmp(dev->member_in_go_iface, go_interface_addr,
474			      ETH_ALEN) == 0) {
475			os_memset(dev->member_in_go_iface, 0, ETH_ALEN);
476			os_memset(dev->member_in_go_dev, 0, ETH_ALEN);
477		}
478	}
479
480	for (c = 0; c < info.num_clients; c++) {
481		struct p2p_client_info *cli = &info.client[c];
482		if (os_memcmp(cli->p2p_device_addr, p2p->cfg->dev_addr,
483			      ETH_ALEN) == 0)
484			continue; /* ignore our own entry */
485		dev = p2p_get_device(p2p, cli->p2p_device_addr);
486		if (dev) {
487			if (dev->flags & (P2P_DEV_GROUP_CLIENT_ONLY |
488					  P2P_DEV_PROBE_REQ_ONLY)) {
489				/*
490				 * Update information since we have not
491				 * received this directly from the client.
492				 */
493				p2p_copy_client_info(dev, cli);
494			} else {
495				/*
496				 * Need to update P2P Client Discoverability
497				 * flag since it is valid only in P2P Group
498				 * Info attribute.
499				 */
500				dev->info.dev_capab &=
501					~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
502				dev->info.dev_capab |=
503					cli->dev_capab &
504					P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
505			}
506			if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
507				dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
508			}
509		} else {
510			dev = p2p_create_device(p2p, cli->p2p_device_addr);
511			if (dev == NULL)
512				continue;
513			dev->flags |= P2P_DEV_GROUP_CLIENT_ONLY;
514			p2p_copy_client_info(dev, cli);
515			dev->oper_freq = freq;
516			p2p->cfg->dev_found(p2p->cfg->cb_ctx,
517					    dev->info.p2p_device_addr,
518					    &dev->info, 1);
519			dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
520		}
521
522		os_memcpy(dev->interface_addr, cli->p2p_interface_addr,
523			  ETH_ALEN);
524		os_get_time(&dev->last_seen);
525		os_memcpy(dev->member_in_go_dev, go_dev_addr, ETH_ALEN);
526		os_memcpy(dev->member_in_go_iface, go_interface_addr,
527			  ETH_ALEN);
528	}
529
530	return 0;
531}
532
533
534static void p2p_copy_wps_info(struct p2p_device *dev, int probe_req,
535			      const struct p2p_message *msg)
536{
537	os_memcpy(dev->info.device_name, msg->device_name,
538		  sizeof(dev->info.device_name));
539
540	if (msg->manufacturer &&
541	    msg->manufacturer_len < sizeof(dev->info.manufacturer)) {
542		os_memset(dev->info.manufacturer, 0,
543			  sizeof(dev->info.manufacturer));
544		os_memcpy(dev->info.manufacturer, msg->manufacturer,
545			  msg->manufacturer_len);
546	}
547
548	if (msg->model_name &&
549	    msg->model_name_len < sizeof(dev->info.model_name)) {
550		os_memset(dev->info.model_name, 0,
551			  sizeof(dev->info.model_name));
552		os_memcpy(dev->info.model_name, msg->model_name,
553			  msg->model_name_len);
554	}
555
556	if (msg->model_number &&
557	    msg->model_number_len < sizeof(dev->info.model_number)) {
558		os_memset(dev->info.model_number, 0,
559			  sizeof(dev->info.model_number));
560		os_memcpy(dev->info.model_number, msg->model_number,
561			  msg->model_number_len);
562	}
563
564	if (msg->serial_number &&
565	    msg->serial_number_len < sizeof(dev->info.serial_number)) {
566		os_memset(dev->info.serial_number, 0,
567			  sizeof(dev->info.serial_number));
568		os_memcpy(dev->info.serial_number, msg->serial_number,
569			  msg->serial_number_len);
570	}
571
572	if (msg->pri_dev_type)
573		os_memcpy(dev->info.pri_dev_type, msg->pri_dev_type,
574			  sizeof(dev->info.pri_dev_type));
575	else if (msg->wps_pri_dev_type)
576		os_memcpy(dev->info.pri_dev_type, msg->wps_pri_dev_type,
577			  sizeof(dev->info.pri_dev_type));
578
579	if (msg->wps_sec_dev_type_list) {
580		os_memcpy(dev->info.wps_sec_dev_type_list,
581			  msg->wps_sec_dev_type_list,
582			  msg->wps_sec_dev_type_list_len);
583		dev->info.wps_sec_dev_type_list_len =
584			msg->wps_sec_dev_type_list_len;
585	}
586
587	if (msg->capability) {
588		/*
589		 * P2P Client Discoverability bit is reserved in all frames
590		 * that use this function, so do not change its value here.
591		 */
592		dev->info.dev_capab &= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
593		dev->info.dev_capab |= msg->capability[0] &
594			~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
595		dev->info.group_capab = msg->capability[1];
596	}
597
598	if (msg->ext_listen_timing) {
599		dev->ext_listen_period = WPA_GET_LE16(msg->ext_listen_timing);
600		dev->ext_listen_interval =
601			WPA_GET_LE16(msg->ext_listen_timing + 2);
602	}
603
604	if (!probe_req) {
605		dev->info.config_methods = msg->config_methods ?
606			msg->config_methods : msg->wps_config_methods;
607	}
608}
609
610
611/**
612 * p2p_add_device - Add peer entries based on scan results or P2P frames
613 * @p2p: P2P module context from p2p_init()
614 * @addr: Source address of Beacon or Probe Response frame (may be either
615 *	P2P Device Address or P2P Interface Address)
616 * @level: Signal level (signal strength of the received frame from the peer)
617 * @freq: Frequency on which the Beacon or Probe Response frame was received
618 * @ies: IEs from the Beacon or Probe Response frame
619 * @ies_len: Length of ies buffer in octets
620 * @scan_res: Whether this was based on scan results
621 * Returns: 0 on success, -1 on failure
622 *
623 * If the scan result is for a GO, the clients in the group will also be added
624 * to the peer table. This function can also be used with some other frames
625 * like Provision Discovery Request that contains P2P Capability and P2P Device
626 * Info attributes.
627 */
628int p2p_add_device(struct p2p_data *p2p, const u8 *addr, int freq, int level,
629		   const u8 *ies, size_t ies_len, int scan_res)
630{
631	struct p2p_device *dev;
632	struct p2p_message msg;
633	const u8 *p2p_dev_addr;
634	int i;
635
636	os_memset(&msg, 0, sizeof(msg));
637	if (p2p_parse_ies(ies, ies_len, &msg)) {
638		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
639			"P2P: Failed to parse P2P IE for a device entry");
640		p2p_parse_free(&msg);
641		return -1;
642	}
643
644	if (msg.p2p_device_addr)
645		p2p_dev_addr = msg.p2p_device_addr;
646	else if (msg.device_id)
647		p2p_dev_addr = msg.device_id;
648	else {
649		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
650			"P2P: Ignore scan data without P2P Device Info or "
651			"P2P Device Id");
652		p2p_parse_free(&msg);
653		return -1;
654	}
655
656	if (!is_zero_ether_addr(p2p->peer_filter) &&
657	    os_memcmp(p2p_dev_addr, p2p->peer_filter, ETH_ALEN) != 0) {
658		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Do not add peer "
659			"filter for " MACSTR " due to peer filter",
660			MAC2STR(p2p_dev_addr));
661		return 0;
662	}
663
664	dev = p2p_create_device(p2p, p2p_dev_addr);
665	if (dev == NULL) {
666		p2p_parse_free(&msg);
667		return -1;
668	}
669	os_get_time(&dev->last_seen);
670	dev->flags &= ~(P2P_DEV_PROBE_REQ_ONLY | P2P_DEV_GROUP_CLIENT_ONLY);
671
672	if (os_memcmp(addr, p2p_dev_addr, ETH_ALEN) != 0)
673		os_memcpy(dev->interface_addr, addr, ETH_ALEN);
674	if (msg.ssid &&
675	    (msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
676	     os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
677	     != 0)) {
678		os_memcpy(dev->oper_ssid, msg.ssid + 2, msg.ssid[1]);
679		dev->oper_ssid_len = msg.ssid[1];
680	}
681
682	if (freq >= 2412 && freq <= 2484 && msg.ds_params &&
683	    *msg.ds_params >= 1 && *msg.ds_params <= 14) {
684		int ds_freq;
685		if (*msg.ds_params == 14)
686			ds_freq = 2484;
687		else
688			ds_freq = 2407 + *msg.ds_params * 5;
689		if (freq != ds_freq) {
690			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
691				"P2P: Update Listen frequency based on DS "
692				"Parameter Set IE: %d -> %d MHz",
693				freq, ds_freq);
694			freq = ds_freq;
695		}
696	}
697
698	if (dev->listen_freq && dev->listen_freq != freq && scan_res) {
699		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
700			"P2P: Update Listen frequency based on scan "
701			"results (" MACSTR " %d -> %d MHz (DS param %d)",
702			MAC2STR(dev->info.p2p_device_addr), dev->listen_freq,
703			freq, msg.ds_params ? *msg.ds_params : -1);
704	}
705	if (scan_res) {
706		dev->listen_freq = freq;
707		if (msg.group_info)
708			dev->oper_freq = freq;
709	}
710	dev->info.level = level;
711
712	p2p_copy_wps_info(dev, 0, &msg);
713
714	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
715		wpabuf_free(dev->info.wps_vendor_ext[i]);
716		dev->info.wps_vendor_ext[i] = NULL;
717	}
718
719	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
720		if (msg.wps_vendor_ext[i] == NULL)
721			break;
722		dev->info.wps_vendor_ext[i] = wpabuf_alloc_copy(
723			msg.wps_vendor_ext[i], msg.wps_vendor_ext_len[i]);
724		if (dev->info.wps_vendor_ext[i] == NULL)
725			break;
726	}
727
728	if (scan_res) {
729		p2p_add_group_clients(p2p, p2p_dev_addr, addr, freq,
730				      msg.group_info, msg.group_info_len);
731	}
732
733	p2p_parse_free(&msg);
734
735	if (p2p_pending_sd_req(p2p, dev))
736		dev->flags |= P2P_DEV_SD_SCHEDULE;
737
738	if (dev->flags & P2P_DEV_REPORTED)
739		return 0;
740
741	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
742		"P2P: Peer found with Listen frequency %d MHz", freq);
743	if (dev->flags & P2P_DEV_USER_REJECTED) {
744		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
745			"P2P: Do not report rejected device");
746		return 0;
747	}
748
749	p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
750			    !(dev->flags & P2P_DEV_REPORTED_ONCE));
751	dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
752
753	return 0;
754}
755
756
757static void p2p_device_free(struct p2p_data *p2p, struct p2p_device *dev)
758{
759	int i;
760
761	if (p2p->go_neg_peer == dev) {
762		/*
763		 * If GO Negotiation is in progress, report that it has failed.
764		 */
765		p2p_go_neg_failed(p2p, dev, -1);
766		p2p->go_neg_peer = NULL;
767	}
768	if (p2p->invite_peer == dev)
769		p2p->invite_peer = NULL;
770	if (p2p->sd_peer == dev)
771		p2p->sd_peer = NULL;
772	if (p2p->pending_client_disc_go == dev)
773		p2p->pending_client_disc_go = NULL;
774
775	/* dev_lost() device, but only if it was previously dev_found() */
776	if (dev->flags & P2P_DEV_REPORTED_ONCE)
777		p2p->cfg->dev_lost(p2p->cfg->cb_ctx,
778				   dev->info.p2p_device_addr);
779
780	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
781		wpabuf_free(dev->info.wps_vendor_ext[i]);
782		dev->info.wps_vendor_ext[i] = NULL;
783	}
784
785	os_free(dev);
786}
787
788
789static int p2p_get_next_prog_freq(struct p2p_data *p2p)
790{
791	struct p2p_channels *c;
792	struct p2p_reg_class *cla;
793	size_t cl, ch;
794	int found = 0;
795	u8 reg_class;
796	u8 channel;
797	int freq;
798
799	c = &p2p->cfg->channels;
800	for (cl = 0; cl < c->reg_classes; cl++) {
801		cla = &c->reg_class[cl];
802		if (cla->reg_class != p2p->last_prog_scan_class)
803			continue;
804		for (ch = 0; ch < cla->channels; ch++) {
805			if (cla->channel[ch] == p2p->last_prog_scan_chan) {
806				found = 1;
807				break;
808			}
809		}
810		if (found)
811			break;
812	}
813
814	if (!found) {
815		/* Start from beginning */
816		reg_class = c->reg_class[0].reg_class;
817		channel = c->reg_class[0].channel[0];
818	} else {
819		/* Pick the next channel */
820		ch++;
821		if (ch == cla->channels) {
822			cl++;
823			if (cl == c->reg_classes)
824				cl = 0;
825			ch = 0;
826		}
827		reg_class = c->reg_class[cl].reg_class;
828		channel = c->reg_class[cl].channel[ch];
829	}
830
831	freq = p2p_channel_to_freq(p2p->cfg->country, reg_class, channel);
832	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Next progressive search "
833		"channel: reg_class %u channel %u -> %d MHz",
834		reg_class, channel, freq);
835	p2p->last_prog_scan_class = reg_class;
836	p2p->last_prog_scan_chan = channel;
837
838	if (freq == 2412 || freq == 2437 || freq == 2462)
839		return 0; /* No need to add social channels */
840	return freq;
841}
842
843
844static void p2p_search(struct p2p_data *p2p)
845{
846	int freq = 0;
847	enum p2p_scan_type type;
848	u16 pw_id = DEV_PW_DEFAULT;
849
850	if (p2p->drv_in_listen) {
851		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is still "
852			"in Listen state - wait for it to end before "
853			"continuing");
854		return;
855	}
856	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
857
858	if (p2p->find_type == P2P_FIND_PROGRESSIVE &&
859	    (freq = p2p_get_next_prog_freq(p2p)) > 0) {
860		type = P2P_SCAN_SOCIAL_PLUS_ONE;
861		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search "
862			"(+ freq %u)", freq);
863	} else {
864		type = P2P_SCAN_SOCIAL;
865		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting search");
866	}
867
868	if (p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, type, freq,
869			       p2p->num_req_dev_types, p2p->req_dev_types,
870			       p2p->find_dev_id, pw_id)) {
871		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
872			"P2P: Scan request failed");
873		p2p_continue_find(p2p);
874	} else {
875		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
876		p2p->p2p_scan_running = 1;
877		eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
878		eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
879				       p2p, NULL);
880	}
881}
882
883
884static void p2p_find_timeout(void *eloop_ctx, void *timeout_ctx)
885{
886	struct p2p_data *p2p = eloop_ctx;
887	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Find timeout -> stop");
888	p2p_stop_find(p2p);
889}
890
891
892static int p2p_run_after_scan(struct p2p_data *p2p)
893{
894	struct p2p_device *dev;
895	enum p2p_after_scan op;
896
897	if (p2p->after_scan_tx) {
898		/* TODO: schedule p2p_run_after_scan to be called from TX
899		 * status callback(?) */
900		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send pending "
901			"Action frame at p2p_scan completion");
902		p2p->cfg->send_action(p2p->cfg->cb_ctx,
903				      p2p->after_scan_tx->freq,
904				      p2p->after_scan_tx->dst,
905				      p2p->after_scan_tx->src,
906				      p2p->after_scan_tx->bssid,
907				      (u8 *) (p2p->after_scan_tx + 1),
908				      p2p->after_scan_tx->len,
909				      p2p->after_scan_tx->wait_time);
910		os_free(p2p->after_scan_tx);
911		p2p->after_scan_tx = NULL;
912#ifdef ANDROID_P2P
913		/* For SD frames, there is a scenario, where we can receive a SD request frame during p2p_scan.
914		 * At that moment, we will send the SD response from this context. After sending the SD response,
915		 * we need to continue p2p_find. But if we return 1 from here, p2p_find is going to be stopped.
916		 */
917		return 0;
918#else
919		return 1;
920#endif
921	}
922
923	op = p2p->start_after_scan;
924	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
925	switch (op) {
926	case P2P_AFTER_SCAN_NOTHING:
927		break;
928	case P2P_AFTER_SCAN_LISTEN:
929		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
930			"requested Listen state");
931		p2p_listen(p2p, p2p->pending_listen_sec * 1000 +
932			   p2p->pending_listen_usec / 1000);
933		return 1;
934	case P2P_AFTER_SCAN_CONNECT:
935		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Start previously "
936			"requested connect with " MACSTR,
937			MAC2STR(p2p->after_scan_peer));
938		dev = p2p_get_device(p2p, p2p->after_scan_peer);
939		if (dev == NULL) {
940			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer not "
941				"known anymore");
942			break;
943		}
944		p2p_connect_send(p2p, dev);
945		return 1;
946	}
947
948	return 0;
949}
950
951
952static void p2p_scan_timeout(void *eloop_ctx, void *timeout_ctx)
953{
954	struct p2p_data *p2p = eloop_ctx;
955	int running;
956	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan timeout "
957		"(running=%d)", p2p->p2p_scan_running);
958	running = p2p->p2p_scan_running;
959	/* Make sure we recover from missed scan results callback */
960	p2p->p2p_scan_running = 0;
961
962	if (running)
963		p2p_run_after_scan(p2p);
964}
965
966
967static void p2p_free_req_dev_types(struct p2p_data *p2p)
968{
969	p2p->num_req_dev_types = 0;
970	os_free(p2p->req_dev_types);
971	p2p->req_dev_types = NULL;
972}
973
974
975int p2p_find(struct p2p_data *p2p, unsigned int timeout,
976	     enum p2p_discovery_type type,
977	     unsigned int num_req_dev_types, const u8 *req_dev_types,
978	     const u8 *dev_id)
979{
980	int res;
981
982	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting find (type=%d)",
983		type);
984	if (p2p->p2p_scan_running) {
985		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan is "
986			"already running");
987	}
988
989	p2p_free_req_dev_types(p2p);
990	if (req_dev_types && num_req_dev_types) {
991		p2p->req_dev_types = os_malloc(num_req_dev_types *
992					       WPS_DEV_TYPE_LEN);
993		if (p2p->req_dev_types == NULL)
994			return -1;
995		os_memcpy(p2p->req_dev_types, req_dev_types,
996			  num_req_dev_types * WPS_DEV_TYPE_LEN);
997		p2p->num_req_dev_types = num_req_dev_types;
998	}
999
1000	if (dev_id) {
1001		os_memcpy(p2p->find_dev_id_buf, dev_id, ETH_ALEN);
1002		p2p->find_dev_id = p2p->find_dev_id_buf;
1003	} else
1004		p2p->find_dev_id = NULL;
1005
1006	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1007	p2p_clear_timeout(p2p);
1008	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1009	p2p->find_type = type;
1010	p2p_device_clear_reported(p2p);
1011	p2p_set_state(p2p, P2P_SEARCH);
1012	eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1013	p2p->last_p2p_find_timeout = timeout;
1014	if (timeout)
1015		eloop_register_timeout(timeout, 0, p2p_find_timeout,
1016				       p2p, NULL);
1017	switch (type) {
1018	case P2P_FIND_START_WITH_FULL:
1019	case P2P_FIND_PROGRESSIVE:
1020		res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_FULL, 0,
1021					 p2p->num_req_dev_types,
1022					 p2p->req_dev_types, dev_id,
1023					 DEV_PW_DEFAULT);
1024		break;
1025	case P2P_FIND_ONLY_SOCIAL:
1026		res = p2p->cfg->p2p_scan(p2p->cfg->cb_ctx, P2P_SCAN_SOCIAL, 0,
1027					 p2p->num_req_dev_types,
1028					 p2p->req_dev_types, dev_id,
1029					 DEV_PW_DEFAULT);
1030		break;
1031	default:
1032		return -1;
1033	}
1034
1035	if (res == 0) {
1036		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Running p2p_scan");
1037		p2p->p2p_scan_running = 1;
1038		eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
1039		eloop_register_timeout(P2P_SCAN_TIMEOUT, 0, p2p_scan_timeout,
1040				       p2p, NULL);
1041	} else if (res == 1) {
1042		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Could not start "
1043			"p2p_scan at this point - will try again after "
1044			"previous scan completes");
1045		res = 0;
1046		p2p_set_state(p2p, P2P_SEARCH_WHEN_READY);
1047		eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1048	} else {
1049		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
1050			"p2p_scan");
1051		p2p_set_state(p2p, P2P_IDLE);
1052		eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1053	}
1054
1055	return res;
1056}
1057
1058#ifdef ANDROID_P2P
1059int p2p_search_pending(struct p2p_data *p2p)
1060{
1061	if(p2p == NULL)
1062		return 0;
1063
1064	if(p2p->state == P2P_SEARCH_WHEN_READY)
1065		return 1;
1066
1067	return 0;
1068}
1069#endif
1070
1071int p2p_other_scan_completed(struct p2p_data *p2p)
1072{
1073	if (p2p->state != P2P_SEARCH_WHEN_READY)
1074		return 0;
1075	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Starting pending P2P find "
1076		"now that previous scan was completed");
1077	if (p2p_find(p2p, p2p->last_p2p_find_timeout, p2p->find_type,
1078		     p2p->num_req_dev_types, p2p->req_dev_types,
1079		     p2p->find_dev_id) < 0)
1080		return 0;
1081	return 1;
1082}
1083
1084
1085void p2p_stop_find_for_freq(struct p2p_data *p2p, int freq)
1086{
1087	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Stopping find");
1088	eloop_cancel_timeout(p2p_find_timeout, p2p, NULL);
1089	p2p_clear_timeout(p2p);
1090	if (p2p->state == P2P_SEARCH)
1091		wpa_msg(p2p->cfg->msg_ctx, MSG_INFO, P2P_EVENT_FIND_STOPPED);
1092	p2p_set_state(p2p, P2P_IDLE);
1093	p2p_free_req_dev_types(p2p);
1094	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1095	p2p->go_neg_peer = NULL;
1096	p2p->sd_peer = NULL;
1097	p2p->invite_peer = NULL;
1098	p2p_stop_listen_for_freq(p2p, freq);
1099}
1100
1101
1102void p2p_stop_listen_for_freq(struct p2p_data *p2p, int freq)
1103{
1104	if (freq > 0 && p2p->drv_in_listen == freq && p2p->in_listen) {
1105		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip stop_listen "
1106			"since we are on correct channel for response");
1107		return;
1108	}
1109	if (p2p->in_listen) {
1110		p2p->in_listen = 0;
1111		p2p_clear_timeout(p2p);
1112	}
1113	if (p2p->drv_in_listen) {
1114		/*
1115		 * The driver may not deliver callback to p2p_listen_end()
1116		 * when the operation gets canceled, so clear the internal
1117		 * variable that is tracking driver state.
1118		 */
1119		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Clear "
1120			"drv_in_listen (%d)", p2p->drv_in_listen);
1121		p2p->drv_in_listen = 0;
1122	}
1123	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1124}
1125
1126
1127void p2p_stop_find(struct p2p_data *p2p)
1128{
1129	p2p_stop_find_for_freq(p2p, 0);
1130}
1131
1132
1133static int p2p_prepare_channel(struct p2p_data *p2p, unsigned int force_freq)
1134{
1135	if (force_freq) {
1136		u8 op_reg_class, op_channel;
1137		if (p2p_freq_to_channel(p2p->cfg->country, force_freq,
1138					&op_reg_class, &op_channel) < 0) {
1139			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1140				"P2P: Unsupported frequency %u MHz",
1141				force_freq);
1142			return -1;
1143		}
1144		if (!p2p_channels_includes(&p2p->cfg->channels, op_reg_class,
1145					   op_channel)) {
1146			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1147				"P2P: Frequency %u MHz (oper_class %u "
1148				"channel %u) not allowed for P2P",
1149				force_freq, op_reg_class, op_channel);
1150			return -1;
1151		}
1152		p2p->op_reg_class = op_reg_class;
1153		p2p->op_channel = op_channel;
1154#ifndef ANDROID_P2P
1155		p2p->channels.reg_classes = 1;
1156		p2p->channels.reg_class[0].channels = 1;
1157		p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
1158		p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
1159#else
1160		if(p2p->cfg->p2p_concurrency == P2P_MULTI_CHANNEL_CONCURRENT) {
1161			/* We we are requesting for a preferred channel. But since
1162			 * are multichannel concurrent, we have to poplulate the
1163			 * p2p_channels with list of channels that we support.
1164			 */
1165			os_memcpy(&p2p->channels, &p2p->cfg->channels,
1166				sizeof(struct p2p_channels));
1167		} else {
1168			p2p->channels.reg_classes = 1;
1169			p2p->channels.reg_class[0].channels = 1;
1170			p2p->channels.reg_class[0].reg_class = p2p->op_reg_class;
1171			p2p->channels.reg_class[0].channel[0] = p2p->op_channel;
1172		}
1173#endif
1174	} else {
1175		u8 op_reg_class, op_channel;
1176
1177		if (!p2p->cfg->cfg_op_channel && p2p->best_freq_overall > 0 &&
1178		    p2p_supported_freq(p2p, p2p->best_freq_overall) &&
1179		    p2p_freq_to_channel(p2p->cfg->country,
1180					p2p->best_freq_overall,
1181					&op_reg_class, &op_channel) == 0) {
1182			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1183				"P2P: Select best overall channel as "
1184				"operating channel preference");
1185			p2p->op_reg_class = op_reg_class;
1186			p2p->op_channel = op_channel;
1187		} else if (!p2p->cfg->cfg_op_channel && p2p->best_freq_5 > 0 &&
1188			   p2p_supported_freq(p2p, p2p->best_freq_5) &&
1189			   p2p_freq_to_channel(p2p->cfg->country,
1190					       p2p->best_freq_5,
1191					       &op_reg_class, &op_channel) ==
1192			   0) {
1193			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1194				"P2P: Select best 5 GHz channel as "
1195				"operating channel preference");
1196			p2p->op_reg_class = op_reg_class;
1197			p2p->op_channel = op_channel;
1198		} else if (!p2p->cfg->cfg_op_channel &&
1199			   p2p->best_freq_24 > 0 &&
1200			   p2p_supported_freq(p2p, p2p->best_freq_24) &&
1201			   p2p_freq_to_channel(p2p->cfg->country,
1202					       p2p->best_freq_24,
1203					       &op_reg_class, &op_channel) ==
1204			   0) {
1205			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1206				"P2P: Select best 2.4 GHz channel as "
1207				"operating channel preference");
1208			p2p->op_reg_class = op_reg_class;
1209			p2p->op_channel = op_channel;
1210		} else {
1211			p2p->op_reg_class = p2p->cfg->op_reg_class;
1212			p2p->op_channel = p2p->cfg->op_channel;
1213		}
1214
1215		os_memcpy(&p2p->channels, &p2p->cfg->channels,
1216			  sizeof(struct p2p_channels));
1217	}
1218	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1219		"P2P: Own preference for operation channel: "
1220		"Operating Class %u Channel %u%s",
1221		p2p->op_reg_class, p2p->op_channel,
1222		force_freq ? " (forced)" : "");
1223
1224	return 0;
1225}
1226
1227
1228static void p2p_set_dev_persistent(struct p2p_device *dev,
1229				   int persistent_group)
1230{
1231	switch (persistent_group) {
1232	case 0:
1233		dev->flags &= ~(P2P_DEV_PREFER_PERSISTENT_GROUP |
1234				P2P_DEV_PREFER_PERSISTENT_RECONN);
1235		break;
1236	case 1:
1237		dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP;
1238		dev->flags &= ~P2P_DEV_PREFER_PERSISTENT_RECONN;
1239		break;
1240	case 2:
1241		dev->flags |= P2P_DEV_PREFER_PERSISTENT_GROUP |
1242			P2P_DEV_PREFER_PERSISTENT_RECONN;
1243		break;
1244	}
1245}
1246
1247
1248int p2p_connect(struct p2p_data *p2p, const u8 *peer_addr,
1249		enum p2p_wps_method wps_method,
1250		int go_intent, const u8 *own_interface_addr,
1251		unsigned int force_freq, int persistent_group,
1252		const u8 *force_ssid, size_t force_ssid_len,
1253		int pd_before_go_neg)
1254{
1255	struct p2p_device *dev;
1256
1257	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1258		"P2P: Request to start group negotiation - peer=" MACSTR
1259		"  GO Intent=%d  Intended Interface Address=" MACSTR
1260		" wps_method=%d persistent_group=%d pd_before_go_neg=%d",
1261		MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1262		wps_method, persistent_group, pd_before_go_neg);
1263
1264	if (p2p_prepare_channel(p2p, force_freq) < 0)
1265		return -1;
1266
1267	dev = p2p_get_device(p2p, peer_addr);
1268	if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
1269		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1270			"P2P: Cannot connect to unknown P2P Device " MACSTR,
1271			MAC2STR(peer_addr));
1272		return -1;
1273	}
1274
1275	if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
1276		if (!(dev->info.dev_capab &
1277		      P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
1278			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1279				"P2P: Cannot connect to P2P Device " MACSTR
1280				" that is in a group and is not discoverable",
1281				MAC2STR(peer_addr));
1282			return -1;
1283		}
1284		if (dev->oper_freq <= 0) {
1285			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1286				"P2P: Cannot connect to P2P Device " MACSTR
1287				" with incomplete information",
1288				MAC2STR(peer_addr));
1289			return -1;
1290		}
1291
1292		/*
1293		 * First, try to connect directly. If the peer does not
1294		 * acknowledge frames, assume it is sleeping and use device
1295		 * discoverability via the GO at that point.
1296		 */
1297	}
1298
1299	p2p->ssid_set = 0;
1300	if (force_ssid) {
1301		wpa_hexdump_ascii(MSG_DEBUG, "P2P: Forced SSID",
1302				  force_ssid, force_ssid_len);
1303		os_memcpy(p2p->ssid, force_ssid, force_ssid_len);
1304		p2p->ssid_len = force_ssid_len;
1305		p2p->ssid_set = 1;
1306	}
1307
1308	dev->flags &= ~P2P_DEV_NOT_YET_READY;
1309	dev->flags &= ~P2P_DEV_USER_REJECTED;
1310	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
1311	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
1312	if (pd_before_go_neg)
1313		dev->flags |= P2P_DEV_PD_BEFORE_GO_NEG;
1314	else
1315		dev->flags &= ~P2P_DEV_PD_BEFORE_GO_NEG;
1316	dev->connect_reqs = 0;
1317	dev->go_neg_req_sent = 0;
1318	dev->go_state = UNKNOWN_GO;
1319	p2p_set_dev_persistent(dev, persistent_group);
1320	p2p->go_intent = go_intent;
1321	os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1322
1323	if (p2p->state != P2P_IDLE)
1324		p2p_stop_find(p2p);
1325
1326	if (p2p->after_scan_tx) {
1327		/*
1328		 * We need to drop the pending frame to avoid issues with the
1329		 * new GO Negotiation, e.g., when the pending frame was from a
1330		 * previous attempt at starting a GO Negotiation.
1331		 */
1332		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dropped "
1333			"previous pending Action frame TX that was waiting "
1334			"for p2p_scan completion");
1335		os_free(p2p->after_scan_tx);
1336		p2p->after_scan_tx = NULL;
1337	}
1338
1339	dev->wps_method = wps_method;
1340	dev->status = P2P_SC_SUCCESS;
1341
1342	if (force_freq)
1343		dev->flags |= P2P_DEV_FORCE_FREQ;
1344	else
1345		dev->flags &= ~P2P_DEV_FORCE_FREQ;
1346
1347	if (p2p->p2p_scan_running) {
1348		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1349			"P2P: p2p_scan running - delay connect send");
1350		p2p->start_after_scan = P2P_AFTER_SCAN_CONNECT;
1351		os_memcpy(p2p->after_scan_peer, peer_addr, ETH_ALEN);
1352		return 0;
1353	}
1354	p2p->start_after_scan = P2P_AFTER_SCAN_NOTHING;
1355
1356	return p2p_connect_send(p2p, dev);
1357}
1358
1359
1360int p2p_authorize(struct p2p_data *p2p, const u8 *peer_addr,
1361		  enum p2p_wps_method wps_method,
1362		  int go_intent, const u8 *own_interface_addr,
1363		  unsigned int force_freq, int persistent_group,
1364		  const u8 *force_ssid, size_t force_ssid_len)
1365{
1366	struct p2p_device *dev;
1367
1368	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1369		"P2P: Request to authorize group negotiation - peer=" MACSTR
1370		"  GO Intent=%d  Intended Interface Address=" MACSTR
1371		" wps_method=%d  persistent_group=%d",
1372		MAC2STR(peer_addr), go_intent, MAC2STR(own_interface_addr),
1373		wps_method, persistent_group);
1374
1375	if (p2p_prepare_channel(p2p, force_freq) < 0)
1376		return -1;
1377
1378	dev = p2p_get_device(p2p, peer_addr);
1379	if (dev == NULL) {
1380		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1381			"P2P: Cannot authorize unknown P2P Device " MACSTR,
1382			MAC2STR(peer_addr));
1383		return -1;
1384	}
1385
1386	p2p->ssid_set = 0;
1387	if (force_ssid) {
1388		wpa_hexdump_ascii(MSG_DEBUG, "P2P: Forced SSID",
1389				  force_ssid, force_ssid_len);
1390		os_memcpy(p2p->ssid, force_ssid, force_ssid_len);
1391		p2p->ssid_len = force_ssid_len;
1392		p2p->ssid_set = 1;
1393	}
1394
1395	dev->flags &= ~P2P_DEV_NOT_YET_READY;
1396	dev->flags &= ~P2P_DEV_USER_REJECTED;
1397	dev->go_neg_req_sent = 0;
1398	dev->go_state = UNKNOWN_GO;
1399	p2p_set_dev_persistent(dev, persistent_group);
1400	p2p->go_intent = go_intent;
1401	os_memcpy(p2p->intended_addr, own_interface_addr, ETH_ALEN);
1402
1403	dev->wps_method = wps_method;
1404	dev->status = P2P_SC_SUCCESS;
1405
1406	if (force_freq)
1407		dev->flags |= P2P_DEV_FORCE_FREQ;
1408	else
1409		dev->flags &= ~P2P_DEV_FORCE_FREQ;
1410
1411	return 0;
1412}
1413
1414
1415void p2p_add_dev_info(struct p2p_data *p2p, const u8 *addr,
1416		      struct p2p_device *dev, struct p2p_message *msg)
1417{
1418	os_get_time(&dev->last_seen);
1419
1420	p2p_copy_wps_info(dev, 0, msg);
1421
1422	if (msg->listen_channel) {
1423		int freq;
1424		freq = p2p_channel_to_freq((char *) msg->listen_channel,
1425					   msg->listen_channel[3],
1426					   msg->listen_channel[4]);
1427		if (freq < 0) {
1428			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1429				"P2P: Unknown peer Listen channel: "
1430				"country=%c%c(0x%02x) reg_class=%u channel=%u",
1431				msg->listen_channel[0],
1432				msg->listen_channel[1],
1433				msg->listen_channel[2],
1434				msg->listen_channel[3],
1435				msg->listen_channel[4]);
1436		} else {
1437			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update "
1438				"peer " MACSTR " Listen channel: %u -> %u MHz",
1439				MAC2STR(dev->info.p2p_device_addr),
1440				dev->listen_freq, freq);
1441			dev->listen_freq = freq;
1442		}
1443	}
1444
1445	if (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
1446		dev->flags &= ~P2P_DEV_PROBE_REQ_ONLY;
1447		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1448			"P2P: Completed device entry based on data from "
1449			"GO Negotiation Request");
1450	} else {
1451		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1452			"P2P: Created device entry based on GO Neg Req: "
1453			MACSTR " dev_capab=0x%x group_capab=0x%x name='%s' "
1454			"listen_freq=%d",
1455			MAC2STR(dev->info.p2p_device_addr),
1456			dev->info.dev_capab, dev->info.group_capab,
1457			dev->info.device_name, dev->listen_freq);
1458	}
1459
1460	dev->flags &= ~P2P_DEV_GROUP_CLIENT_ONLY;
1461
1462	if (dev->flags & P2P_DEV_USER_REJECTED) {
1463		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1464			"P2P: Do not report rejected device");
1465		return;
1466	}
1467
1468	p2p->cfg->dev_found(p2p->cfg->cb_ctx, addr, &dev->info,
1469			    !(dev->flags & P2P_DEV_REPORTED_ONCE));
1470	dev->flags |= P2P_DEV_REPORTED | P2P_DEV_REPORTED_ONCE;
1471}
1472
1473
1474void p2p_build_ssid(struct p2p_data *p2p, u8 *ssid, size_t *ssid_len)
1475{
1476	os_memcpy(ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
1477	p2p_random((char *) &ssid[P2P_WILDCARD_SSID_LEN], 2);
1478	os_memcpy(&ssid[P2P_WILDCARD_SSID_LEN + 2],
1479		  p2p->cfg->ssid_postfix, p2p->cfg->ssid_postfix_len);
1480	*ssid_len = P2P_WILDCARD_SSID_LEN + 2 + p2p->cfg->ssid_postfix_len;
1481}
1482
1483
1484int p2p_go_params(struct p2p_data *p2p, struct p2p_go_neg_results *params)
1485{
1486	p2p_build_ssid(p2p, params->ssid, &params->ssid_len);
1487	p2p_random(params->passphrase, 8);
1488	return 0;
1489}
1490
1491
1492void p2p_go_complete(struct p2p_data *p2p, struct p2p_device *peer)
1493{
1494	struct p2p_go_neg_results res;
1495	int go = peer->go_state == LOCAL_GO;
1496	struct p2p_channels intersection;
1497	int freqs;
1498	size_t i, j;
1499
1500	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1501		"P2P: GO Negotiation with " MACSTR " completed (%s will be "
1502		"GO)", MAC2STR(peer->info.p2p_device_addr),
1503		go ? "local end" : "peer");
1504
1505	os_memset(&res, 0, sizeof(res));
1506	res.role_go = go;
1507	os_memcpy(res.peer_device_addr, peer->info.p2p_device_addr, ETH_ALEN);
1508	os_memcpy(res.peer_interface_addr, peer->intended_addr, ETH_ALEN);
1509	res.wps_method = peer->wps_method;
1510	if (peer->flags & P2P_DEV_PREFER_PERSISTENT_GROUP) {
1511		if (peer->flags & P2P_DEV_PREFER_PERSISTENT_RECONN)
1512			res.persistent_group = 2;
1513		else
1514			res.persistent_group = 1;
1515	}
1516
1517	if (go) {
1518		/* Setup AP mode for WPS provisioning */
1519		res.freq = p2p_channel_to_freq(p2p->cfg->country,
1520					       p2p->op_reg_class,
1521					       p2p->op_channel);
1522		os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1523		res.ssid_len = p2p->ssid_len;
1524		p2p_random(res.passphrase, 8);
1525	} else {
1526		res.freq = peer->oper_freq;
1527		if (p2p->ssid_len) {
1528			os_memcpy(res.ssid, p2p->ssid, p2p->ssid_len);
1529			res.ssid_len = p2p->ssid_len;
1530		}
1531	}
1532
1533	p2p_channels_intersect(&p2p->channels, &peer->channels,
1534			       &intersection);
1535	freqs = 0;
1536	for (i = 0; i < intersection.reg_classes; i++) {
1537		struct p2p_reg_class *c = &intersection.reg_class[i];
1538		if (freqs + 1 == P2P_MAX_CHANNELS)
1539			break;
1540		for (j = 0; j < c->channels; j++) {
1541			int freq;
1542			if (freqs + 1 == P2P_MAX_CHANNELS)
1543				break;
1544			freq = p2p_channel_to_freq(peer->country, c->reg_class,
1545						   c->channel[j]);
1546			if (freq < 0)
1547				continue;
1548			res.freq_list[freqs++] = freq;
1549		}
1550	}
1551
1552	res.peer_config_timeout = go ? peer->client_timeout : peer->go_timeout;
1553
1554	p2p_clear_timeout(p2p);
1555	p2p->ssid_set = 0;
1556	peer->go_neg_req_sent = 0;
1557	peer->wps_method = WPS_NOT_READY;
1558
1559	p2p_set_state(p2p, P2P_PROVISIONING);
1560	p2p->cfg->go_neg_completed(p2p->cfg->cb_ctx, &res);
1561}
1562
1563
1564static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
1565			      const u8 *data, size_t len, int rx_freq)
1566{
1567	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1568		"P2P: RX P2P Public Action from " MACSTR, MAC2STR(sa));
1569	wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
1570
1571	if (len < 1)
1572		return;
1573
1574	switch (data[0]) {
1575	case P2P_GO_NEG_REQ:
1576		p2p_process_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
1577		break;
1578	case P2P_GO_NEG_RESP:
1579		p2p_process_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
1580		break;
1581	case P2P_GO_NEG_CONF:
1582		p2p_process_go_neg_conf(p2p, sa, data + 1, len - 1);
1583		break;
1584	case P2P_INVITATION_REQ:
1585		p2p_process_invitation_req(p2p, sa, data + 1, len - 1,
1586					   rx_freq);
1587		break;
1588	case P2P_INVITATION_RESP:
1589		p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
1590		break;
1591	case P2P_PROV_DISC_REQ:
1592		p2p_process_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
1593		break;
1594	case P2P_PROV_DISC_RESP:
1595		p2p_process_prov_disc_resp(p2p, sa, data + 1, len - 1);
1596		break;
1597	case P2P_DEV_DISC_REQ:
1598		p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
1599		break;
1600	case P2P_DEV_DISC_RESP:
1601		p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
1602		break;
1603	default:
1604		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1605			"P2P: Unsupported P2P Public Action frame type %d",
1606			data[0]);
1607		break;
1608	}
1609}
1610
1611
1612static void p2p_rx_action_public(struct p2p_data *p2p, const u8 *da,
1613				 const u8 *sa, const u8 *bssid, const u8 *data,
1614				 size_t len, int freq)
1615{
1616	if (len < 1)
1617		return;
1618
1619	switch (data[0]) {
1620	case WLAN_PA_VENDOR_SPECIFIC:
1621		data++;
1622		len--;
1623		if (len < 3)
1624			return;
1625		if (WPA_GET_BE24(data) != OUI_WFA)
1626			return;
1627
1628		data += 3;
1629		len -= 3;
1630		if (len < 1)
1631			return;
1632
1633		if (*data != P2P_OUI_TYPE)
1634			return;
1635
1636		p2p_rx_p2p_action(p2p, sa, data + 1, len - 1, freq);
1637		break;
1638	case WLAN_PA_GAS_INITIAL_REQ:
1639		p2p_rx_gas_initial_req(p2p, sa, data + 1, len - 1, freq);
1640		break;
1641	case WLAN_PA_GAS_INITIAL_RESP:
1642		p2p_rx_gas_initial_resp(p2p, sa, data + 1, len - 1, freq);
1643		break;
1644	case WLAN_PA_GAS_COMEBACK_REQ:
1645		p2p_rx_gas_comeback_req(p2p, sa, data + 1, len - 1, freq);
1646		break;
1647	case WLAN_PA_GAS_COMEBACK_RESP:
1648		p2p_rx_gas_comeback_resp(p2p, sa, data + 1, len - 1, freq);
1649		break;
1650	}
1651}
1652
1653
1654void p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa,
1655		   const u8 *bssid, u8 category,
1656		   const u8 *data, size_t len, int freq)
1657{
1658	if (category == WLAN_ACTION_PUBLIC) {
1659		p2p_rx_action_public(p2p, da, sa, bssid, data, len, freq);
1660		return;
1661	}
1662
1663	if (category != WLAN_ACTION_VENDOR_SPECIFIC)
1664		return;
1665
1666	if (len < 4)
1667		return;
1668
1669	if (WPA_GET_BE24(data) != OUI_WFA)
1670		return;
1671	data += 3;
1672	len -= 3;
1673
1674	if (*data != P2P_OUI_TYPE)
1675		return;
1676	data++;
1677	len--;
1678
1679	/* P2P action frame */
1680	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1681		"P2P: RX P2P Action from " MACSTR, MAC2STR(sa));
1682	wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Action contents", data, len);
1683
1684	if (len < 1)
1685		return;
1686	switch (data[0]) {
1687	case P2P_NOA:
1688		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1689			"P2P: Received P2P Action - Notice of Absence");
1690		/* TODO */
1691		break;
1692	case P2P_PRESENCE_REQ:
1693		p2p_process_presence_req(p2p, da, sa, data + 1, len - 1, freq);
1694		break;
1695	case P2P_PRESENCE_RESP:
1696		p2p_process_presence_resp(p2p, da, sa, data + 1, len - 1);
1697		break;
1698	case P2P_GO_DISC_REQ:
1699		p2p_process_go_disc_req(p2p, da, sa, data + 1, len - 1, freq);
1700		break;
1701	default:
1702		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1703			"P2P: Received P2P Action - unknown type %u", data[0]);
1704		break;
1705	}
1706}
1707
1708
1709static void p2p_go_neg_start(void *eloop_ctx, void *timeout_ctx)
1710{
1711	struct p2p_data *p2p = eloop_ctx;
1712	if (p2p->go_neg_peer == NULL)
1713		return;
1714	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1715	p2p->go_neg_peer->status = P2P_SC_SUCCESS;
1716	p2p_connect_send(p2p, p2p->go_neg_peer);
1717}
1718
1719
1720static void p2p_invite_start(void *eloop_ctx, void *timeout_ctx)
1721{
1722	struct p2p_data *p2p = eloop_ctx;
1723	if (p2p->invite_peer == NULL)
1724		return;
1725	p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
1726	p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr);
1727}
1728
1729
1730static void p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr,
1731				       const u8 *ie, size_t ie_len)
1732{
1733	struct p2p_message msg;
1734	struct p2p_device *dev;
1735
1736	os_memset(&msg, 0, sizeof(msg));
1737	if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL)
1738	{
1739		p2p_parse_free(&msg);
1740		return; /* not a P2P probe */
1741	}
1742
1743	if (msg.ssid == NULL || msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
1744	    os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
1745	    != 0) {
1746		/* The Probe Request is not part of P2P Device Discovery. It is
1747		 * not known whether the source address of the frame is the P2P
1748		 * Device Address or P2P Interface Address. Do not add a new
1749		 * peer entry based on this frames.
1750		 */
1751		p2p_parse_free(&msg);
1752		return;
1753	}
1754
1755	dev = p2p_get_device(p2p, addr);
1756	if (dev) {
1757		if (dev->country[0] == 0 && msg.listen_channel)
1758			os_memcpy(dev->country, msg.listen_channel, 3);
1759		os_get_time(&dev->last_seen);
1760		p2p_parse_free(&msg);
1761		return; /* already known */
1762	}
1763
1764	dev = p2p_create_device(p2p, addr);
1765	if (dev == NULL) {
1766		p2p_parse_free(&msg);
1767		return;
1768	}
1769
1770	os_get_time(&dev->last_seen);
1771	dev->flags |= P2P_DEV_PROBE_REQ_ONLY;
1772
1773	if (msg.listen_channel) {
1774		os_memcpy(dev->country, msg.listen_channel, 3);
1775		dev->listen_freq = p2p_channel_to_freq(dev->country,
1776						       msg.listen_channel[3],
1777						       msg.listen_channel[4]);
1778	}
1779
1780	p2p_copy_wps_info(dev, 1, &msg);
1781
1782	p2p_parse_free(&msg);
1783
1784	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
1785		"P2P: Created device entry based on Probe Req: " MACSTR
1786		" dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d",
1787		MAC2STR(dev->info.p2p_device_addr), dev->info.dev_capab,
1788		dev->info.group_capab, dev->info.device_name,
1789		dev->listen_freq);
1790}
1791
1792
1793struct p2p_device * p2p_add_dev_from_go_neg_req(struct p2p_data *p2p,
1794						const u8 *addr,
1795						struct p2p_message *msg)
1796{
1797	struct p2p_device *dev;
1798
1799	dev = p2p_get_device(p2p, addr);
1800	if (dev) {
1801		os_get_time(&dev->last_seen);
1802		return dev; /* already known */
1803	}
1804
1805	dev = p2p_create_device(p2p, addr);
1806	if (dev == NULL)
1807		return NULL;
1808
1809	p2p_add_dev_info(p2p, addr, dev, msg);
1810
1811	return dev;
1812}
1813
1814
1815static int dev_type_match(const u8 *dev_type, const u8 *req_dev_type)
1816{
1817	if (os_memcmp(dev_type, req_dev_type, WPS_DEV_TYPE_LEN) == 0)
1818		return 1;
1819	if (os_memcmp(dev_type, req_dev_type, 2) == 0 &&
1820	    WPA_GET_BE32(&req_dev_type[2]) == 0 &&
1821	    WPA_GET_BE16(&req_dev_type[6]) == 0)
1822		return 1; /* Category match with wildcard OUI/sub-category */
1823	return 0;
1824}
1825
1826
1827int dev_type_list_match(const u8 *dev_type, const u8 *req_dev_type[],
1828			size_t num_req_dev_type)
1829{
1830	size_t i;
1831	for (i = 0; i < num_req_dev_type; i++) {
1832		if (dev_type_match(dev_type, req_dev_type[i]))
1833			return 1;
1834	}
1835	return 0;
1836}
1837
1838
1839/**
1840 * p2p_match_dev_type - Match local device type with requested type
1841 * @p2p: P2P module context from p2p_init()
1842 * @wps: WPS TLVs from Probe Request frame (concatenated WPS IEs)
1843 * Returns: 1 on match, 0 on mismatch
1844 *
1845 * This function can be used to match the Requested Device Type attribute in
1846 * WPS IE with the local device types for deciding whether to reply to a Probe
1847 * Request frame.
1848 */
1849int p2p_match_dev_type(struct p2p_data *p2p, struct wpabuf *wps)
1850{
1851	struct wps_parse_attr attr;
1852	size_t i;
1853
1854	if (wps_parse_msg(wps, &attr))
1855		return 1; /* assume no Requested Device Type attributes */
1856
1857	if (attr.num_req_dev_type == 0)
1858		return 1; /* no Requested Device Type attributes -> match */
1859
1860	if (dev_type_list_match(p2p->cfg->pri_dev_type, attr.req_dev_type,
1861				attr.num_req_dev_type))
1862		return 1; /* Own Primary Device Type matches */
1863
1864	for (i = 0; i < p2p->cfg->num_sec_dev_types; i++)
1865		if (dev_type_list_match(p2p->cfg->sec_dev_type[i],
1866					attr.req_dev_type,
1867					attr.num_req_dev_type))
1868		return 1; /* Own Secondary Device Type matches */
1869
1870	/* No matching device type found */
1871	return 0;
1872}
1873
1874
1875struct wpabuf * p2p_build_probe_resp_ies(struct p2p_data *p2p)
1876{
1877	struct wpabuf *buf;
1878	u8 *len;
1879	int pw_id = -1;
1880
1881	buf = wpabuf_alloc(1000);
1882	if (buf == NULL)
1883		return NULL;
1884
1885	if (p2p->go_neg_peer) {
1886		/* Advertise immediate availability of WPS credential */
1887		pw_id = p2p_wps_method_pw_id(p2p->go_neg_peer->wps_method);
1888	}
1889
1890	p2p_build_wps_ie(p2p, buf, pw_id, 1);
1891
1892	/* P2P IE */
1893	len = p2p_buf_add_ie_hdr(buf);
1894	p2p_buf_add_capability(buf, p2p->dev_capab &
1895			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
1896	if (p2p->ext_listen_interval)
1897		p2p_buf_add_ext_listen_timing(buf, p2p->ext_listen_period,
1898					      p2p->ext_listen_interval);
1899	p2p_buf_add_device_info(buf, p2p, NULL);
1900	p2p_buf_update_ie_hdr(buf, len);
1901
1902	return buf;
1903}
1904
1905
1906static int is_11b(u8 rate)
1907{
1908	return rate == 0x02 || rate == 0x04 || rate == 0x0b || rate == 0x16;
1909}
1910
1911
1912static int supp_rates_11b_only(struct ieee802_11_elems *elems)
1913{
1914	int num_11b = 0, num_others = 0;
1915	int i;
1916
1917	if (elems->supp_rates == NULL && elems->ext_supp_rates == NULL)
1918		return 0;
1919
1920	for (i = 0; elems->supp_rates && i < elems->supp_rates_len; i++) {
1921		if (is_11b(elems->supp_rates[i]))
1922			num_11b++;
1923		else
1924			num_others++;
1925	}
1926
1927	for (i = 0; elems->ext_supp_rates && i < elems->ext_supp_rates_len;
1928	     i++) {
1929		if (is_11b(elems->ext_supp_rates[i]))
1930			num_11b++;
1931		else
1932			num_others++;
1933	}
1934
1935	return num_11b > 0 && num_others == 0;
1936}
1937
1938
1939static enum p2p_probe_req_status
1940p2p_reply_probe(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
1941		const u8 *bssid, const u8 *ie, size_t ie_len)
1942{
1943	struct ieee802_11_elems elems;
1944	struct wpabuf *buf;
1945	struct ieee80211_mgmt *resp;
1946	struct p2p_message msg;
1947	struct wpabuf *ies;
1948
1949	if (!p2p->in_listen || !p2p->drv_in_listen) {
1950		/* not in Listen state - ignore Probe Request */
1951		return P2P_PREQ_NOT_LISTEN;
1952	}
1953
1954	if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) ==
1955	    ParseFailed) {
1956		/* Ignore invalid Probe Request frames */
1957		return P2P_PREQ_MALFORMED;
1958	}
1959
1960	if (elems.p2p == NULL) {
1961		/* not a P2P probe - ignore it */
1962		return P2P_PREQ_NOT_P2P;
1963	}
1964
1965	if (dst && !is_broadcast_ether_addr(dst) &&
1966	    os_memcmp(dst, p2p->cfg->dev_addr, ETH_ALEN) != 0) {
1967		/* Not sent to the broadcast address or our P2P Device Address
1968		 */
1969		return P2P_PREQ_NOT_PROCESSED;
1970	}
1971
1972	if (bssid && !is_broadcast_ether_addr(bssid)) {
1973		/* Not sent to the Wildcard BSSID */
1974		return P2P_PREQ_NOT_PROCESSED;
1975	}
1976
1977	if (elems.ssid == NULL || elems.ssid_len != P2P_WILDCARD_SSID_LEN ||
1978	    os_memcmp(elems.ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) !=
1979	    0) {
1980		/* not using P2P Wildcard SSID - ignore */
1981		return P2P_PREQ_NOT_PROCESSED;
1982	}
1983
1984	if (supp_rates_11b_only(&elems)) {
1985		/* Indicates support for 11b rates only */
1986		return P2P_PREQ_NOT_P2P;
1987	}
1988
1989	os_memset(&msg, 0, sizeof(msg));
1990	if (p2p_parse_ies(ie, ie_len, &msg) < 0) {
1991		/* Could not parse P2P attributes */
1992		return P2P_PREQ_NOT_P2P;
1993	}
1994
1995	if (msg.device_id &&
1996	    os_memcmp(msg.device_id, p2p->cfg->dev_addr, ETH_ALEN) != 0) {
1997		/* Device ID did not match */
1998		p2p_parse_free(&msg);
1999		return P2P_PREQ_NOT_PROCESSED;
2000	}
2001
2002	/* Check Requested Device Type match */
2003	if (msg.wps_attributes &&
2004	    !p2p_match_dev_type(p2p, msg.wps_attributes)) {
2005		/* No match with Requested Device Type */
2006		p2p_parse_free(&msg);
2007		return P2P_PREQ_NOT_PROCESSED;
2008	}
2009	p2p_parse_free(&msg);
2010
2011	if (!p2p->cfg->send_probe_resp) {
2012		/* Response generated elsewhere */
2013		return P2P_PREQ_NOT_PROCESSED;
2014	}
2015
2016	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2017		"P2P: Reply to P2P Probe Request in Listen state");
2018
2019	/*
2020	 * We do not really have a specific BSS that this frame is advertising,
2021	 * so build a frame that has some information in valid format. This is
2022	 * really only used for discovery purposes, not to learn exact BSS
2023	 * parameters.
2024	 */
2025	ies = p2p_build_probe_resp_ies(p2p);
2026	if (ies == NULL)
2027		return P2P_PREQ_NOT_PROCESSED;
2028
2029	buf = wpabuf_alloc(200 + wpabuf_len(ies));
2030	if (buf == NULL) {
2031		wpabuf_free(ies);
2032		return P2P_PREQ_NOT_PROCESSED;
2033	}
2034
2035	resp = NULL;
2036	resp = wpabuf_put(buf, resp->u.probe_resp.variable - (u8 *) resp);
2037
2038	resp->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) |
2039					   (WLAN_FC_STYPE_PROBE_RESP << 4));
2040	os_memcpy(resp->da, addr, ETH_ALEN);
2041	os_memcpy(resp->sa, p2p->cfg->dev_addr, ETH_ALEN);
2042	os_memcpy(resp->bssid, p2p->cfg->dev_addr, ETH_ALEN);
2043	resp->u.probe_resp.beacon_int = host_to_le16(100);
2044	/* hardware or low-level driver will setup seq_ctrl and timestamp */
2045	resp->u.probe_resp.capab_info =
2046		host_to_le16(WLAN_CAPABILITY_SHORT_PREAMBLE |
2047			     WLAN_CAPABILITY_PRIVACY |
2048			     WLAN_CAPABILITY_SHORT_SLOT_TIME);
2049
2050	wpabuf_put_u8(buf, WLAN_EID_SSID);
2051	wpabuf_put_u8(buf, P2P_WILDCARD_SSID_LEN);
2052	wpabuf_put_data(buf, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN);
2053
2054	wpabuf_put_u8(buf, WLAN_EID_SUPP_RATES);
2055	wpabuf_put_u8(buf, 8);
2056	wpabuf_put_u8(buf, (60 / 5) | 0x80);
2057	wpabuf_put_u8(buf, 90 / 5);
2058	wpabuf_put_u8(buf, (120 / 5) | 0x80);
2059	wpabuf_put_u8(buf, 180 / 5);
2060	wpabuf_put_u8(buf, (240 / 5) | 0x80);
2061	wpabuf_put_u8(buf, 360 / 5);
2062	wpabuf_put_u8(buf, 480 / 5);
2063	wpabuf_put_u8(buf, 540 / 5);
2064
2065	wpabuf_put_u8(buf, WLAN_EID_DS_PARAMS);
2066	wpabuf_put_u8(buf, 1);
2067	wpabuf_put_u8(buf, p2p->cfg->channel);
2068
2069	wpabuf_put_buf(buf, ies);
2070	wpabuf_free(ies);
2071
2072	p2p->cfg->send_probe_resp(p2p->cfg->cb_ctx, buf);
2073
2074	wpabuf_free(buf);
2075
2076	return P2P_PREQ_NOT_PROCESSED;
2077}
2078
2079
2080enum p2p_probe_req_status
2081p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *dst,
2082		 const u8 *bssid, const u8 *ie, size_t ie_len)
2083{
2084	enum p2p_probe_req_status res;
2085
2086	p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len);
2087
2088	res = p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len);
2089
2090	if ((p2p->state == P2P_CONNECT || p2p->state == P2P_CONNECT_LISTEN) &&
2091	    p2p->go_neg_peer &&
2092	    os_memcmp(addr, p2p->go_neg_peer->info.p2p_device_addr, ETH_ALEN)
2093	    == 0) {
2094		/* Received a Probe Request from GO Negotiation peer */
2095		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2096			"P2P: Found GO Negotiation peer - try to start GO "
2097			"negotiation from timeout");
2098		eloop_register_timeout(0, 0, p2p_go_neg_start, p2p, NULL);
2099		return P2P_PREQ_PROCESSED;
2100	}
2101
2102	if ((p2p->state == P2P_INVITE || p2p->state == P2P_INVITE_LISTEN) &&
2103	    p2p->invite_peer &&
2104	    os_memcmp(addr, p2p->invite_peer->info.p2p_device_addr, ETH_ALEN)
2105	    == 0) {
2106		/* Received a Probe Request from Invite peer */
2107		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2108			"P2P: Found Invite peer - try to start Invite from "
2109			"timeout");
2110		eloop_register_timeout(0, 0, p2p_invite_start, p2p, NULL);
2111		return P2P_PREQ_PROCESSED;
2112	}
2113
2114	return res;
2115}
2116
2117
2118static int p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid,
2119				    u8 *buf, size_t len, struct wpabuf *p2p_ie)
2120{
2121	struct wpabuf *tmp;
2122	u8 *lpos;
2123	size_t tmplen;
2124	int res;
2125	u8 group_capab;
2126
2127	if (p2p_ie == NULL)
2128		return 0; /* WLAN AP is not a P2P manager */
2129
2130	/*
2131	 * (Re)Association Request - P2P IE
2132	 * P2P Capability attribute (shall be present)
2133	 * P2P Interface attribute (present if concurrent device and
2134	 *	P2P Management is enabled)
2135	 */
2136	tmp = wpabuf_alloc(200);
2137	if (tmp == NULL)
2138		return -1;
2139
2140	lpos = p2p_buf_add_ie_hdr(tmp);
2141	group_capab = 0;
2142	if (p2p->num_groups > 0) {
2143		group_capab |= P2P_GROUP_CAPAB_GROUP_OWNER;
2144		if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2145		    (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED) &&
2146		    p2p->cross_connect)
2147			group_capab |= P2P_GROUP_CAPAB_CROSS_CONN;
2148	}
2149	p2p_buf_add_capability(tmp, p2p->dev_capab, group_capab);
2150	if ((p2p->dev_capab & P2P_DEV_CAPAB_CONCURRENT_OPER) &&
2151	    (p2p->dev_capab & P2P_DEV_CAPAB_INFRA_MANAGED))
2152		p2p_buf_add_p2p_interface(tmp, p2p);
2153	p2p_buf_update_ie_hdr(tmp, lpos);
2154
2155	tmplen = wpabuf_len(tmp);
2156	if (tmplen > len)
2157		res = -1;
2158	else {
2159		os_memcpy(buf, wpabuf_head(tmp), tmplen);
2160		res = tmplen;
2161	}
2162	wpabuf_free(tmp);
2163
2164	return res;
2165}
2166
2167
2168int p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf,
2169		     size_t len, int p2p_group, struct wpabuf *p2p_ie)
2170{
2171	struct wpabuf *tmp;
2172	u8 *lpos;
2173	struct p2p_device *peer;
2174	size_t tmplen;
2175	int res;
2176
2177	if (!p2p_group)
2178		return p2p_assoc_req_ie_wlan_ap(p2p, bssid, buf, len, p2p_ie);
2179
2180	/*
2181	 * (Re)Association Request - P2P IE
2182	 * P2P Capability attribute (shall be present)
2183	 * Extended Listen Timing (may be present)
2184	 * P2P Device Info attribute (shall be present)
2185	 */
2186	tmp = wpabuf_alloc(200);
2187	if (tmp == NULL)
2188		return -1;
2189
2190	peer = bssid ? p2p_get_device(p2p, bssid) : NULL;
2191
2192	lpos = p2p_buf_add_ie_hdr(tmp);
2193	p2p_buf_add_capability(tmp, p2p->dev_capab, 0);
2194	if (p2p->ext_listen_interval)
2195		p2p_buf_add_ext_listen_timing(tmp, p2p->ext_listen_period,
2196					      p2p->ext_listen_interval);
2197	p2p_buf_add_device_info(tmp, p2p, peer);
2198	p2p_buf_update_ie_hdr(tmp, lpos);
2199
2200	tmplen = wpabuf_len(tmp);
2201	if (tmplen > len)
2202		res = -1;
2203	else {
2204		os_memcpy(buf, wpabuf_head(tmp), tmplen);
2205		res = tmplen;
2206	}
2207	wpabuf_free(tmp);
2208
2209	return res;
2210}
2211
2212
2213int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end)
2214{
2215	struct wpabuf *p2p_ie;
2216	int ret;
2217
2218	p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, P2P_IE_VENDOR_TYPE);
2219	if (p2p_ie == NULL)
2220		return 0;
2221
2222	ret = p2p_attr_text(p2p_ie, buf, end);
2223	wpabuf_free(p2p_ie);
2224	return ret;
2225}
2226
2227
2228int p2p_parse_dev_addr_in_p2p_ie(struct wpabuf *p2p_ie, u8 *dev_addr)
2229{
2230	struct p2p_message msg;
2231
2232	os_memset(&msg, 0, sizeof(msg));
2233	if (p2p_parse_p2p_ie(p2p_ie, &msg))
2234		return -1;
2235
2236	if (msg.p2p_device_addr) {
2237		os_memcpy(dev_addr, msg.p2p_device_addr, ETH_ALEN);
2238		return 0;
2239	} else if (msg.device_id) {
2240		os_memcpy(dev_addr, msg.device_id, ETH_ALEN);
2241		return 0;
2242	}
2243	return -1;
2244}
2245
2246
2247int p2p_parse_dev_addr(const u8 *ies, size_t ies_len, u8 *dev_addr)
2248{
2249	struct wpabuf *p2p_ie;
2250	int ret;
2251
2252	p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
2253					     P2P_IE_VENDOR_TYPE);
2254	if (p2p_ie == NULL)
2255		return -1;
2256	ret = p2p_parse_dev_addr_in_p2p_ie(p2p_ie, dev_addr);
2257	wpabuf_free(p2p_ie);
2258	return ret;
2259}
2260
2261
2262static void p2p_clear_go_neg(struct p2p_data *p2p)
2263{
2264	p2p->go_neg_peer = NULL;
2265	p2p_clear_timeout(p2p);
2266	p2p_set_state(p2p, P2P_IDLE);
2267}
2268
2269
2270void p2p_wps_success_cb(struct p2p_data *p2p, const u8 *mac_addr)
2271{
2272	if (p2p->go_neg_peer == NULL) {
2273		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2274			"P2P: No pending Group Formation - "
2275			"ignore WPS registration success notification");
2276		return; /* No pending Group Formation */
2277	}
2278
2279	if (os_memcmp(mac_addr, p2p->go_neg_peer->intended_addr, ETH_ALEN) !=
2280	    0) {
2281		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2282			"P2P: Ignore WPS registration success notification "
2283			"for " MACSTR " (GO Negotiation peer " MACSTR ")",
2284			MAC2STR(mac_addr),
2285			MAC2STR(p2p->go_neg_peer->intended_addr));
2286		return; /* Ignore unexpected peer address */
2287	}
2288
2289	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2290		"P2P: Group Formation completed successfully with " MACSTR,
2291		MAC2STR(mac_addr));
2292
2293	p2p_clear_go_neg(p2p);
2294}
2295
2296
2297void p2p_group_formation_failed(struct p2p_data *p2p)
2298{
2299	if (p2p->go_neg_peer == NULL) {
2300		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2301			"P2P: No pending Group Formation - "
2302			"ignore group formation failure notification");
2303		return; /* No pending Group Formation */
2304	}
2305
2306	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2307		"P2P: Group Formation failed with " MACSTR,
2308		MAC2STR(p2p->go_neg_peer->intended_addr));
2309
2310	p2p_clear_go_neg(p2p);
2311}
2312
2313
2314struct p2p_data * p2p_init(const struct p2p_config *cfg)
2315{
2316	struct p2p_data *p2p;
2317
2318	if (cfg->max_peers < 1)
2319		return NULL;
2320
2321	p2p = os_zalloc(sizeof(*p2p) + sizeof(*cfg));
2322	if (p2p == NULL)
2323		return NULL;
2324	p2p->cfg = (struct p2p_config *) (p2p + 1);
2325	os_memcpy(p2p->cfg, cfg, sizeof(*cfg));
2326	if (cfg->dev_name)
2327		p2p->cfg->dev_name = os_strdup(cfg->dev_name);
2328	if (cfg->manufacturer)
2329		p2p->cfg->manufacturer = os_strdup(cfg->manufacturer);
2330	if (cfg->model_name)
2331		p2p->cfg->model_name = os_strdup(cfg->model_name);
2332	if (cfg->model_number)
2333		p2p->cfg->model_number = os_strdup(cfg->model_number);
2334	if (cfg->serial_number)
2335		p2p->cfg->serial_number = os_strdup(cfg->serial_number);
2336	if (cfg->pref_chan) {
2337		p2p->cfg->pref_chan = os_malloc(cfg->num_pref_chan *
2338						sizeof(struct p2p_channel));
2339		if (p2p->cfg->pref_chan) {
2340			os_memcpy(p2p->cfg->pref_chan, cfg->pref_chan,
2341				  cfg->num_pref_chan *
2342				  sizeof(struct p2p_channel));
2343		} else
2344			p2p->cfg->num_pref_chan = 0;
2345	}
2346
2347#ifdef ANDROID_P2P
2348	/* 100ms listen time is too less to receive the response frames in some scenarios
2349	 * increasing min listen time to 200ms.
2350	 */
2351	p2p->min_disc_int = 2;
2352	/* SD_FAIR_POLICY: Initializing the SD current serviced pointer to NULL */
2353	p2p->sd_dev_list = NULL;
2354#else
2355	p2p->min_disc_int = 1;
2356#endif
2357	p2p->max_disc_int = 3;
2358
2359	os_get_random(&p2p->next_tie_breaker, 1);
2360	p2p->next_tie_breaker &= 0x01;
2361	if (cfg->sd_request)
2362		p2p->dev_capab |= P2P_DEV_CAPAB_SERVICE_DISCOVERY;
2363	p2p->dev_capab |= P2P_DEV_CAPAB_INVITATION_PROCEDURE;
2364	if (cfg->concurrent_operations)
2365		p2p->dev_capab |= P2P_DEV_CAPAB_CONCURRENT_OPER;
2366	p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
2367
2368	dl_list_init(&p2p->devices);
2369
2370	eloop_register_timeout(P2P_PEER_EXPIRATION_INTERVAL, 0,
2371			       p2p_expiration_timeout, p2p, NULL);
2372
2373	return p2p;
2374}
2375
2376
2377void p2p_deinit(struct p2p_data *p2p)
2378{
2379	eloop_cancel_timeout(p2p_expiration_timeout, p2p, NULL);
2380	eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
2381	eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
2382	p2p_flush(p2p);
2383	p2p_free_req_dev_types(p2p);
2384	os_free(p2p->cfg->dev_name);
2385	os_free(p2p->cfg->manufacturer);
2386	os_free(p2p->cfg->model_name);
2387	os_free(p2p->cfg->model_number);
2388	os_free(p2p->cfg->serial_number);
2389	os_free(p2p->cfg->pref_chan);
2390	os_free(p2p->groups);
2391	wpabuf_free(p2p->sd_resp);
2392	os_free(p2p->after_scan_tx);
2393	p2p_remove_wps_vendor_extensions(p2p);
2394	os_free(p2p);
2395}
2396
2397
2398void p2p_flush(struct p2p_data *p2p)
2399{
2400	struct p2p_device *dev, *prev;
2401	p2p_stop_find(p2p);
2402	dl_list_for_each_safe(dev, prev, &p2p->devices, struct p2p_device,
2403			      list) {
2404		dl_list_del(&dev->list);
2405		p2p_device_free(p2p, dev);
2406	}
2407#ifdef ANDROID_P2P
2408	/* SD_FAIR_POLICY: Initializing the SD current serviced pointer to NULL */
2409	p2p->sd_dev_list = NULL;
2410#endif
2411	p2p_free_sd_queries(p2p);
2412	os_free(p2p->after_scan_tx);
2413	p2p->after_scan_tx = NULL;
2414}
2415
2416
2417int p2p_unauthorize(struct p2p_data *p2p, const u8 *addr)
2418{
2419	struct p2p_device *dev;
2420
2421	dev = p2p_get_device(p2p, addr);
2422	if (dev == NULL)
2423		return -1;
2424
2425	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Unauthorizing " MACSTR,
2426		MAC2STR(addr));
2427
2428	if (p2p->go_neg_peer == dev)
2429		p2p->go_neg_peer = NULL;
2430
2431	dev->wps_method = WPS_NOT_READY;
2432	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_RESPONSE;
2433	dev->flags &= ~P2P_DEV_WAIT_GO_NEG_CONFIRM;
2434
2435	/* Check if after_scan_tx is for this peer. If so free it */
2436	if (p2p->after_scan_tx &&
2437	    os_memcmp(addr, p2p->after_scan_tx->dst, ETH_ALEN) == 0) {
2438		os_free(p2p->after_scan_tx);
2439		p2p->after_scan_tx = NULL;
2440	}
2441
2442	return 0;
2443}
2444
2445
2446int p2p_set_dev_name(struct p2p_data *p2p, const char *dev_name)
2447{
2448	os_free(p2p->cfg->dev_name);
2449	if (dev_name) {
2450		p2p->cfg->dev_name = os_strdup(dev_name);
2451		if (p2p->cfg->dev_name == NULL)
2452			return -1;
2453	} else
2454		p2p->cfg->dev_name = NULL;
2455	return 0;
2456}
2457
2458
2459int p2p_set_manufacturer(struct p2p_data *p2p, const char *manufacturer)
2460{
2461	os_free(p2p->cfg->manufacturer);
2462	p2p->cfg->manufacturer = NULL;
2463	if (manufacturer) {
2464		p2p->cfg->manufacturer = os_strdup(manufacturer);
2465		if (p2p->cfg->manufacturer == NULL)
2466			return -1;
2467	}
2468
2469	return 0;
2470}
2471
2472
2473int p2p_set_model_name(struct p2p_data *p2p, const char *model_name)
2474{
2475	os_free(p2p->cfg->model_name);
2476	p2p->cfg->model_name = NULL;
2477	if (model_name) {
2478		p2p->cfg->model_name = os_strdup(model_name);
2479		if (p2p->cfg->model_name == NULL)
2480			return -1;
2481	}
2482
2483	return 0;
2484}
2485
2486
2487int p2p_set_model_number(struct p2p_data *p2p, const char *model_number)
2488{
2489	os_free(p2p->cfg->model_number);
2490	p2p->cfg->model_number = NULL;
2491	if (model_number) {
2492		p2p->cfg->model_number = os_strdup(model_number);
2493		if (p2p->cfg->model_number == NULL)
2494			return -1;
2495	}
2496
2497	return 0;
2498}
2499
2500
2501int p2p_set_serial_number(struct p2p_data *p2p, const char *serial_number)
2502{
2503	os_free(p2p->cfg->serial_number);
2504	p2p->cfg->serial_number = NULL;
2505	if (serial_number) {
2506		p2p->cfg->serial_number = os_strdup(serial_number);
2507		if (p2p->cfg->serial_number == NULL)
2508			return -1;
2509	}
2510
2511	return 0;
2512}
2513
2514
2515void p2p_set_config_methods(struct p2p_data *p2p, u16 config_methods)
2516{
2517	p2p->cfg->config_methods = config_methods;
2518}
2519
2520
2521void p2p_set_uuid(struct p2p_data *p2p, const u8 *uuid)
2522{
2523	os_memcpy(p2p->cfg->uuid, uuid, 16);
2524}
2525
2526
2527int p2p_set_pri_dev_type(struct p2p_data *p2p, const u8 *pri_dev_type)
2528{
2529	os_memcpy(p2p->cfg->pri_dev_type, pri_dev_type, 8);
2530	return 0;
2531}
2532
2533
2534int p2p_set_sec_dev_types(struct p2p_data *p2p, const u8 dev_types[][8],
2535			  size_t num_dev_types)
2536{
2537	if (num_dev_types > P2P_SEC_DEVICE_TYPES)
2538		num_dev_types = P2P_SEC_DEVICE_TYPES;
2539	p2p->cfg->num_sec_dev_types = num_dev_types;
2540	os_memcpy(p2p->cfg->sec_dev_type, dev_types, num_dev_types * 8);
2541	return 0;
2542}
2543
2544
2545void p2p_remove_wps_vendor_extensions(struct p2p_data *p2p)
2546{
2547	int i;
2548
2549	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
2550		wpabuf_free(p2p->wps_vendor_ext[i]);
2551		p2p->wps_vendor_ext[i] = NULL;
2552	}
2553}
2554
2555
2556int p2p_add_wps_vendor_extension(struct p2p_data *p2p,
2557				 const struct wpabuf *vendor_ext)
2558{
2559	int i;
2560
2561	if (vendor_ext == NULL)
2562		return -1;
2563
2564	for (i = 0; i < P2P_MAX_WPS_VENDOR_EXT; i++) {
2565		if (p2p->wps_vendor_ext[i] == NULL)
2566			break;
2567	}
2568	if (i >= P2P_MAX_WPS_VENDOR_EXT)
2569		return -1;
2570
2571	p2p->wps_vendor_ext[i] = wpabuf_dup(vendor_ext);
2572	if (p2p->wps_vendor_ext[i] == NULL)
2573		return -1;
2574
2575	return 0;
2576}
2577
2578
2579int p2p_set_country(struct p2p_data *p2p, const char *country)
2580{
2581	os_memcpy(p2p->cfg->country, country, 3);
2582	return 0;
2583}
2584
2585
2586void p2p_continue_find(struct p2p_data *p2p)
2587{
2588	struct p2p_device *dev;
2589#ifdef ANDROID_P2P
2590	int skip=1;
2591#endif
2592	p2p_set_state(p2p, P2P_SEARCH);
2593	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
2594#ifdef ANDROID_P2P
2595		/* SD_FAIR_POLICY: We need to give chance to all devices in the device list
2596		 * There may be a scenario, where a particular peer device have
2597		 * not registered any query response. When we send a SD request to such device,
2598		 * no response will be received. And if we continue to get probe responses from that device,
2599		 * and if that device happens to be on top in our device list,
2600		 * we will always continue to send SD requests always to that peer only.
2601		 * We will not be able to send SD requests to other devices in that case.
2602		 * This implementation keeps track of last serviced peer device.
2603		 * And then takes the next one from the device list, in the next iteration.
2604		 */
2605		if (p2p->sd_dev_list && p2p->sd_dev_list != &p2p->devices) {
2606			if(skip) {
2607				if ((&dev->list == p2p->sd_dev_list) ) {
2608					skip = 0;
2609					if (dev->list.next == &p2p->devices)
2610						p2p->sd_dev_list = NULL;
2611				}
2612				continue;
2613			}
2614		}
2615		p2p->sd_dev_list = &dev->list;
2616		wpa_printf(MSG_DEBUG, "P2P: ### Servicing %p dev->flags 0x%x SD schedule %s devaddr " MACSTR,
2617			p2p->sd_dev_list, dev->flags, dev->flags & P2P_DEV_SD_SCHEDULE ? "TRUE": "FALSE",
2618			MAC2STR(dev->info.p2p_device_addr));
2619#endif
2620		if (dev->flags & P2P_DEV_SD_SCHEDULE) {
2621			if (p2p_start_sd(p2p, dev) == 0)
2622				return;
2623			else
2624				break;
2625		} else if (dev->req_config_methods &&
2626			   !(dev->flags & P2P_DEV_PD_FOR_JOIN)) {
2627			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send "
2628				"pending Provision Discovery Request to "
2629				MACSTR " (config methods 0x%x)",
2630				MAC2STR(dev->info.p2p_device_addr),
2631				dev->req_config_methods);
2632			if (p2p_send_prov_disc_req(p2p, dev, 0, 0) == 0)
2633				return;
2634		}
2635	}
2636
2637	p2p_listen_in_find(p2p);
2638}
2639
2640
2641static void p2p_sd_cb(struct p2p_data *p2p, int success)
2642{
2643	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2644		"P2P: Service Discovery Query TX callback: success=%d",
2645		success);
2646	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2647
2648	if (!success) {
2649		if (p2p->sd_peer) {
2650			p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
2651			p2p->sd_peer = NULL;
2652		}
2653		p2p_continue_find(p2p);
2654		return;
2655	}
2656
2657	if (p2p->sd_peer == NULL) {
2658		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2659			"P2P: No SD peer entry known");
2660		p2p_continue_find(p2p);
2661		return;
2662	}
2663
2664	/* Wait for response from the peer */
2665	p2p_set_state(p2p, P2P_SD_DURING_FIND);
2666	p2p_set_timeout(p2p, 0, 200000);
2667}
2668
2669
2670/**
2671 * p2p_retry_pd - Retry any pending provision disc requests in IDLE state
2672 * @p2p: P2P module context from p2p_init()
2673 */
2674static void p2p_retry_pd(struct p2p_data *p2p)
2675{
2676	struct p2p_device *dev;
2677
2678	if (p2p->state != P2P_IDLE)
2679		return;
2680
2681	/*
2682	 * Retry the prov disc req attempt only for the peer that the user had
2683	 * requested for and provided a join has not been initiated on it
2684	 * in the meantime.
2685	 */
2686
2687	dl_list_for_each(dev, &p2p->devices, struct p2p_device, list) {
2688		if (os_memcmp(p2p->pending_pd_devaddr,
2689			      dev->info.p2p_device_addr, ETH_ALEN) != 0)
2690			continue;
2691		if (!dev->req_config_methods)
2692			continue;
2693		if (dev->flags & P2P_DEV_PD_FOR_JOIN)
2694			continue;
2695
2696		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send "
2697			"pending Provision Discovery Request to "
2698			MACSTR " (config methods 0x%x)",
2699			MAC2STR(dev->info.p2p_device_addr),
2700			dev->req_config_methods);
2701		p2p_send_prov_disc_req(p2p, dev, 0, 0);
2702		return;
2703	}
2704}
2705
2706
2707static void p2p_prov_disc_cb(struct p2p_data *p2p, int success)
2708{
2709	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2710		"P2P: Provision Discovery Request TX callback: success=%d",
2711		success);
2712
2713	/*
2714	 * Postpone resetting the pending action state till after we actually
2715	 * time out. This allows us to take some action like notifying any
2716	 * interested parties about no response to the request.
2717	 *
2718	 * When the timer (below) goes off we check in IDLE, SEARCH, or
2719	 * LISTEN_ONLY state, which are the only allowed states to issue a PD
2720	 * requests in, if this was still pending and then raise notification.
2721	 */
2722
2723	if (!success) {
2724		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2725
2726		if (p2p->state != P2P_IDLE)
2727			p2p_continue_find(p2p);
2728		else if (p2p->user_initiated_pd) {
2729			p2p->pending_action_state = P2P_PENDING_PD;
2730			p2p_set_timeout(p2p, 0, 300000);
2731		}
2732		return;
2733	}
2734
2735	/*
2736	 * This postponing, of resetting pending_action_state, needs to be
2737	 * done only for user initiated PD requests and not internal ones.
2738	 */
2739	if (p2p->user_initiated_pd)
2740		p2p->pending_action_state = P2P_PENDING_PD;
2741	else
2742		p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2743
2744	/* Wait for response from the peer */
2745	if (p2p->state == P2P_SEARCH)
2746		p2p_set_state(p2p, P2P_PD_DURING_FIND);
2747	p2p_set_timeout(p2p, 0, 200000);
2748}
2749
2750
2751int p2p_scan_res_handler(struct p2p_data *p2p, const u8 *bssid, int freq,
2752			 int level, const u8 *ies, size_t ies_len)
2753{
2754	p2p_add_device(p2p, bssid, freq, level, ies, ies_len, 1);
2755
2756	return 0;
2757}
2758
2759
2760void p2p_scan_res_handled(struct p2p_data *p2p)
2761{
2762	if (!p2p->p2p_scan_running) {
2763		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan was not "
2764			"running, but scan results received");
2765	}
2766	p2p->p2p_scan_running = 0;
2767	eloop_cancel_timeout(p2p_scan_timeout, p2p, NULL);
2768
2769	if (p2p_run_after_scan(p2p))
2770		return;
2771	if (p2p->state == P2P_SEARCH)
2772		p2p_continue_find(p2p);
2773}
2774
2775
2776void p2p_scan_ie(struct p2p_data *p2p, struct wpabuf *ies, const u8 *dev_id)
2777{
2778	u8 *len = p2p_buf_add_ie_hdr(ies);
2779	p2p_buf_add_capability(ies, p2p->dev_capab &
2780			       ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY, 0);
2781	if (dev_id)
2782		p2p_buf_add_device_id(ies, dev_id);
2783	if (p2p->cfg->reg_class && p2p->cfg->channel)
2784		p2p_buf_add_listen_channel(ies, p2p->cfg->country,
2785					   p2p->cfg->reg_class,
2786					   p2p->cfg->channel);
2787	if (p2p->ext_listen_interval)
2788		p2p_buf_add_ext_listen_timing(ies, p2p->ext_listen_period,
2789					      p2p->ext_listen_interval);
2790	/* TODO: p2p_buf_add_operating_channel() if GO */
2791	p2p_buf_update_ie_hdr(ies, len);
2792}
2793
2794
2795size_t p2p_scan_ie_buf_len(struct p2p_data *p2p)
2796{
2797	return 100;
2798}
2799
2800
2801int p2p_ie_text(struct wpabuf *p2p_ie, char *buf, char *end)
2802{
2803	return p2p_attr_text(p2p_ie, buf, end);
2804}
2805
2806
2807static void p2p_go_neg_req_cb(struct p2p_data *p2p, int success)
2808{
2809	struct p2p_device *dev = p2p->go_neg_peer;
2810
2811	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2812		"P2P: GO Negotiation Request TX callback: success=%d",
2813		success);
2814
2815	if (dev == NULL) {
2816		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2817			"P2P: No pending GO Negotiation");
2818		return;
2819	}
2820
2821	if (success) {
2822		if (dev->flags & P2P_DEV_USER_REJECTED) {
2823			p2p_set_state(p2p, P2P_IDLE);
2824			return;
2825		}
2826	} else if (dev->go_neg_req_sent) {
2827		/* Cancel the increment from p2p_connect_send() on failure */
2828		dev->go_neg_req_sent--;
2829	}
2830
2831	if (!success &&
2832	    (dev->info.dev_capab & P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY) &&
2833	    !is_zero_ether_addr(dev->member_in_go_dev)) {
2834		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2835			"P2P: Peer " MACSTR " did not acknowledge request - "
2836			"try to use device discoverability through its GO",
2837			MAC2STR(dev->info.p2p_device_addr));
2838		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2839		p2p_send_dev_disc_req(p2p, dev);
2840		return;
2841	}
2842
2843	/*
2844	 * Use P2P find, if needed, to find the other device from its listen
2845	 * channel.
2846	 */
2847	p2p_set_state(p2p, P2P_CONNECT);
2848	p2p_set_timeout(p2p, 0, 100000);
2849}
2850
2851
2852static void p2p_go_neg_resp_cb(struct p2p_data *p2p, int success)
2853{
2854	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2855		"P2P: GO Negotiation Response TX callback: success=%d",
2856		success);
2857	if (!p2p->go_neg_peer && p2p->state == P2P_PROVISIONING) {
2858		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2859			"P2P: Ignore TX callback event - GO Negotiation is "
2860			"not running anymore");
2861		return;
2862	}
2863	p2p_set_state(p2p, P2P_CONNECT);
2864	p2p_set_timeout(p2p, 0, 100000);
2865}
2866
2867
2868static void p2p_go_neg_resp_failure_cb(struct p2p_data *p2p, int success)
2869{
2870	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2871		"P2P: GO Negotiation Response (failure) TX callback: "
2872		"success=%d", success);
2873	if (p2p->go_neg_peer && p2p->go_neg_peer->status != P2P_SC_SUCCESS) {
2874		p2p_go_neg_failed(p2p, p2p->go_neg_peer,
2875				  p2p->go_neg_peer->status);
2876	}
2877}
2878
2879
2880static void p2p_go_neg_conf_cb(struct p2p_data *p2p,
2881			       enum p2p_send_action_result result)
2882{
2883	struct p2p_device *dev;
2884
2885	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2886		"P2P: GO Negotiation Confirm TX callback: result=%d",
2887		result);
2888	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
2889	if (result == P2P_SEND_ACTION_FAILED) {
2890		p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
2891		return;
2892	}
2893	if (result == P2P_SEND_ACTION_NO_ACK) {
2894		/*
2895		 * It looks like the TX status for GO Negotiation Confirm is
2896		 * often showing failure even when the peer has actually
2897		 * received the frame. Since the peer may change channels
2898		 * immediately after having received the frame, we may not see
2899		 * an Ack for retries, so just dropping a single frame may
2900		 * trigger this. To allow the group formation to succeed if the
2901		 * peer did indeed receive the frame, continue regardless of
2902		 * the TX status.
2903		 */
2904		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2905			"P2P: Assume GO Negotiation Confirm TX was actually "
2906			"received by the peer even though Ack was not "
2907			"reported");
2908	}
2909
2910	dev = p2p->go_neg_peer;
2911	if (dev == NULL)
2912		return;
2913
2914	p2p_go_complete(p2p, dev);
2915}
2916
2917
2918void p2p_send_action_cb(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
2919			const u8 *src, const u8 *bssid,
2920			enum p2p_send_action_result result)
2921{
2922	enum p2p_pending_action_state state;
2923	int success;
2924
2925	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2926		"P2P: Action frame TX callback (state=%d freq=%u dst=" MACSTR
2927		" src=" MACSTR " bssid=" MACSTR " result=%d",
2928		p2p->pending_action_state, freq, MAC2STR(dst), MAC2STR(src),
2929		MAC2STR(bssid), result);
2930	success = result == P2P_SEND_ACTION_SUCCESS;
2931	state = p2p->pending_action_state;
2932	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
2933	switch (state) {
2934	case P2P_NO_PENDING_ACTION:
2935		break;
2936	case P2P_PENDING_GO_NEG_REQUEST:
2937		p2p_go_neg_req_cb(p2p, success);
2938		break;
2939	case P2P_PENDING_GO_NEG_RESPONSE:
2940		p2p_go_neg_resp_cb(p2p, success);
2941		break;
2942	case P2P_PENDING_GO_NEG_RESPONSE_FAILURE:
2943		p2p_go_neg_resp_failure_cb(p2p, success);
2944		break;
2945	case P2P_PENDING_GO_NEG_CONFIRM:
2946		p2p_go_neg_conf_cb(p2p, result);
2947		break;
2948	case P2P_PENDING_SD:
2949		p2p_sd_cb(p2p, success);
2950		break;
2951	case P2P_PENDING_PD:
2952		p2p_prov_disc_cb(p2p, success);
2953		break;
2954	case P2P_PENDING_INVITATION_REQUEST:
2955		p2p_invitation_req_cb(p2p, success);
2956		break;
2957	case P2P_PENDING_INVITATION_RESPONSE:
2958		p2p_invitation_resp_cb(p2p, success);
2959		break;
2960	case P2P_PENDING_DEV_DISC_REQUEST:
2961		p2p_dev_disc_req_cb(p2p, success);
2962		break;
2963	case P2P_PENDING_DEV_DISC_RESPONSE:
2964		p2p_dev_disc_resp_cb(p2p, success);
2965		break;
2966	case P2P_PENDING_GO_DISC_REQ:
2967		p2p_go_disc_req_cb(p2p, success);
2968		break;
2969	}
2970}
2971
2972
2973void p2p_listen_cb(struct p2p_data *p2p, unsigned int freq,
2974		   unsigned int duration)
2975{
2976	if (freq == p2p->pending_client_disc_freq) {
2977		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2978			"P2P: Client discoverability remain-awake completed");
2979		p2p->pending_client_disc_freq = 0;
2980		return;
2981	}
2982
2983	if (freq != p2p->pending_listen_freq) {
2984		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2985			"P2P: Unexpected listen callback for freq=%u "
2986			"duration=%u (pending_listen_freq=%u)",
2987			freq, duration, p2p->pending_listen_freq);
2988		return;
2989	}
2990
2991	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
2992		"P2P: Starting Listen timeout(%u,%u) on freq=%u based on "
2993		"callback",
2994		p2p->pending_listen_sec, p2p->pending_listen_usec,
2995		p2p->pending_listen_freq);
2996	p2p->in_listen = 1;
2997	p2p->drv_in_listen = freq;
2998	if (p2p->pending_listen_sec || p2p->pending_listen_usec) {
2999		/*
3000		 * Add 20 msec extra wait to avoid race condition with driver
3001		 * remain-on-channel end event, i.e., give driver more time to
3002		 * complete the operation before our timeout expires.
3003		 */
3004		p2p_set_timeout(p2p, p2p->pending_listen_sec,
3005				p2p->pending_listen_usec + 20000);
3006	}
3007
3008	p2p->pending_listen_freq = 0;
3009}
3010
3011
3012int p2p_listen_end(struct p2p_data *p2p, unsigned int freq)
3013{
3014	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver ended Listen "
3015		"state (freq=%u)", freq);
3016	p2p->drv_in_listen = 0;
3017	if (p2p->in_listen)
3018		return 0; /* Internal timeout will trigger the next step */
3019
3020	if (p2p->state == P2P_CONNECT_LISTEN && p2p->go_neg_peer) {
3021		if (p2p->go_neg_peer->connect_reqs >= 120) {
3022			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3023				"P2P: Timeout on sending GO Negotiation "
3024				"Request without getting response");
3025			p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
3026			return 0;
3027		}
3028
3029		p2p_set_state(p2p, P2P_CONNECT);
3030		p2p_connect_send(p2p, p2p->go_neg_peer);
3031		return 1;
3032	} else if (p2p->state == P2P_SEARCH) {
3033		if (p2p->p2p_scan_running) {
3034			 /*
3035			  * Search is already in progress. This can happen if
3036			  * an Action frame RX is reported immediately after
3037			  * the end of a remain-on-channel operation and the
3038			  * response frame to that is sent using an offchannel
3039			  * operation while in p2p_find. Avoid an attempt to
3040			  * restart a scan here.
3041			  */
3042			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: p2p_scan "
3043				"already in progress - do not try to start a "
3044				"new one");
3045			return 1;
3046		}
3047		if (p2p->pending_listen_freq) {
3048			/*
3049			 * Better wait a bit if the driver is unable to start
3050			 * offchannel operation for some reason. p2p_search()
3051			 * will be started from internal timeout.
3052			 */
3053			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Listen "
3054				"operation did not seem to start - delay "
3055				"search phase to avoid busy loop");
3056			p2p_set_timeout(p2p, 0, 100000);
3057			return 1;
3058		}
3059		p2p_search(p2p);
3060		return 1;
3061	}
3062
3063	return 0;
3064}
3065
3066
3067static void p2p_timeout_connect(struct p2p_data *p2p)
3068{
3069	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3070	if (p2p->go_neg_peer &&
3071	    (p2p->go_neg_peer->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM)) {
3072		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Wait for GO "
3073			"Negotiation Confirm timed out - assume GO "
3074			"Negotiation failed");
3075		p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
3076		return;
3077	}
3078	p2p_set_state(p2p, P2P_CONNECT_LISTEN);
3079	p2p_listen_in_find(p2p);
3080}
3081
3082
3083static void p2p_timeout_connect_listen(struct p2p_data *p2p)
3084{
3085	if (p2p->go_neg_peer) {
3086		if (p2p->drv_in_listen) {
3087			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Driver is "
3088				"still in Listen state; wait for it to "
3089				"complete");
3090			return;
3091		}
3092
3093		if (p2p->go_neg_peer->connect_reqs >= 120) {
3094			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3095				"P2P: Timeout on sending GO Negotiation "
3096				"Request without getting response");
3097			p2p_go_neg_failed(p2p, p2p->go_neg_peer, -1);
3098			return;
3099		}
3100
3101		p2p_set_state(p2p, P2P_CONNECT);
3102		p2p_connect_send(p2p, p2p->go_neg_peer);
3103	} else
3104		p2p_set_state(p2p, P2P_IDLE);
3105}
3106
3107
3108static void p2p_timeout_wait_peer_connect(struct p2p_data *p2p)
3109{
3110	/*
3111	 * TODO: could remain constantly in Listen state for some time if there
3112	 * are no other concurrent uses for the radio. For now, go to listen
3113	 * state once per second to give other uses a chance to use the radio.
3114	 */
3115	p2p_set_state(p2p, P2P_WAIT_PEER_IDLE);
3116	p2p_set_timeout(p2p, 0, 500000);
3117}
3118
3119
3120static void p2p_timeout_wait_peer_idle(struct p2p_data *p2p)
3121{
3122	struct p2p_device *dev = p2p->go_neg_peer;
3123
3124	if (dev == NULL) {
3125		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3126			"P2P: Unknown GO Neg peer - stop GO Neg wait");
3127		return;
3128	}
3129
3130	dev->wait_count++;
3131	if (dev->wait_count >= 120) {
3132		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3133			"P2P: Timeout on waiting peer to become ready for GO "
3134			"Negotiation");
3135		p2p_go_neg_failed(p2p, dev, -1);
3136		return;
3137	}
3138
3139	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3140		"P2P: Go to Listen state while waiting for the peer to become "
3141		"ready for GO Negotiation");
3142	p2p_set_state(p2p, P2P_WAIT_PEER_CONNECT);
3143	p2p_listen_in_find(p2p);
3144}
3145
3146
3147static void p2p_timeout_sd_during_find(struct p2p_data *p2p)
3148{
3149	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3150		"P2P: Service Discovery Query timeout");
3151	if (p2p->sd_peer) {
3152		p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3153		p2p->sd_peer->flags &= ~P2P_DEV_SD_SCHEDULE;
3154		p2p->sd_peer = NULL;
3155	}
3156	p2p_continue_find(p2p);
3157}
3158
3159
3160static void p2p_timeout_prov_disc_during_find(struct p2p_data *p2p)
3161{
3162	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3163		"P2P: Provision Discovery Request timeout");
3164	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3165	p2p_continue_find(p2p);
3166}
3167
3168
3169static void p2p_timeout_prov_disc_req(struct p2p_data *p2p)
3170{
3171	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3172
3173	/*
3174	 * For user initiated PD requests that we have not gotten any responses
3175	 * for while in IDLE state, we retry them a couple of times before
3176	 * giving up.
3177	 */
3178	if (!p2p->user_initiated_pd)
3179		return;
3180
3181	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3182		"P2P: User initiated Provision Discovery Request timeout");
3183
3184	if (p2p->pd_retries) {
3185		p2p->pd_retries--;
3186		p2p_retry_pd(p2p);
3187	} else {
3188		if (p2p->cfg->prov_disc_fail)
3189			p2p->cfg->prov_disc_fail(p2p->cfg->cb_ctx,
3190						 p2p->pending_pd_devaddr,
3191						 P2P_PROV_DISC_TIMEOUT);
3192		p2p_reset_pending_pd(p2p);
3193	}
3194}
3195
3196
3197static void p2p_timeout_invite(struct p2p_data *p2p)
3198{
3199	p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
3200	p2p_set_state(p2p, P2P_INVITE_LISTEN);
3201	if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
3202		/*
3203		 * Better remain on operating channel instead of listen channel
3204		 * when running a group.
3205		 */
3206		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Inviting in "
3207			"active GO role - wait on operating channel");
3208		p2p_set_timeout(p2p, 0, 100000);
3209		return;
3210	}
3211	p2p_listen_in_find(p2p);
3212}
3213
3214
3215static void p2p_timeout_invite_listen(struct p2p_data *p2p)
3216{
3217	if (p2p->invite_peer && p2p->invite_peer->invitation_reqs < 100) {
3218		p2p_set_state(p2p, P2P_INVITE);
3219		p2p_invite_send(p2p, p2p->invite_peer,
3220				p2p->invite_go_dev_addr);
3221	} else {
3222		if (p2p->invite_peer) {
3223			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3224				"P2P: Invitation Request retry limit reached");
3225			if (p2p->cfg->invitation_result)
3226				p2p->cfg->invitation_result(
3227					p2p->cfg->cb_ctx, -1, NULL);
3228		}
3229		p2p_set_state(p2p, P2P_IDLE);
3230	}
3231}
3232
3233
3234static void p2p_state_timeout(void *eloop_ctx, void *timeout_ctx)
3235{
3236	struct p2p_data *p2p = eloop_ctx;
3237
3238	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Timeout (state=%s)",
3239		p2p_state_txt(p2p->state));
3240
3241	p2p->in_listen = 0;
3242
3243	switch (p2p->state) {
3244	case P2P_IDLE:
3245		/* Check if we timed out waiting for PD req */
3246		if (p2p->pending_action_state == P2P_PENDING_PD)
3247			p2p_timeout_prov_disc_req(p2p);
3248		break;
3249	case P2P_SEARCH:
3250		/* Check if we timed out waiting for PD req */
3251		if (p2p->pending_action_state == P2P_PENDING_PD)
3252			p2p_timeout_prov_disc_req(p2p);
3253		p2p_search(p2p);
3254		break;
3255	case P2P_CONNECT:
3256		p2p_timeout_connect(p2p);
3257		break;
3258	case P2P_CONNECT_LISTEN:
3259		p2p_timeout_connect_listen(p2p);
3260		break;
3261	case P2P_GO_NEG:
3262		break;
3263	case P2P_LISTEN_ONLY:
3264		/* Check if we timed out waiting for PD req */
3265		if (p2p->pending_action_state == P2P_PENDING_PD)
3266			p2p_timeout_prov_disc_req(p2p);
3267
3268		if (p2p->ext_listen_only) {
3269			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3270				"P2P: Extended Listen Timing - Listen State "
3271				"completed");
3272			p2p->ext_listen_only = 0;
3273			p2p_set_state(p2p, P2P_IDLE);
3274		}
3275		break;
3276	case P2P_WAIT_PEER_CONNECT:
3277		p2p_timeout_wait_peer_connect(p2p);
3278		break;
3279	case P2P_WAIT_PEER_IDLE:
3280		p2p_timeout_wait_peer_idle(p2p);
3281		break;
3282	case P2P_SD_DURING_FIND:
3283		p2p_timeout_sd_during_find(p2p);
3284		break;
3285	case P2P_PROVISIONING:
3286		break;
3287	case P2P_PD_DURING_FIND:
3288		p2p_timeout_prov_disc_during_find(p2p);
3289		break;
3290	case P2P_INVITE:
3291		p2p_timeout_invite(p2p);
3292		break;
3293	case P2P_INVITE_LISTEN:
3294		p2p_timeout_invite_listen(p2p);
3295		break;
3296	case P2P_SEARCH_WHEN_READY:
3297		break;
3298	}
3299}
3300
3301
3302int p2p_reject(struct p2p_data *p2p, const u8 *peer_addr)
3303{
3304	struct p2p_device *dev;
3305
3306	dev = p2p_get_device(p2p, peer_addr);
3307	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Local request to reject "
3308		"connection attempts by peer " MACSTR, MAC2STR(peer_addr));
3309	if (dev == NULL) {
3310		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Peer " MACSTR
3311			" unknown", MAC2STR(peer_addr));
3312		return -1;
3313	}
3314	dev->status = P2P_SC_FAIL_REJECTED_BY_USER;
3315	dev->flags |= P2P_DEV_USER_REJECTED;
3316	return 0;
3317}
3318
3319
3320const char * p2p_wps_method_text(enum p2p_wps_method method)
3321{
3322	switch (method) {
3323	case WPS_NOT_READY:
3324		return "not-ready";
3325	case WPS_PIN_DISPLAY:
3326		return "Display";
3327	case WPS_PIN_KEYPAD:
3328		return "Keypad";
3329	case WPS_PBC:
3330		return "PBC";
3331	}
3332
3333	return "??";
3334}
3335
3336
3337static const char * p2p_go_state_text(enum p2p_go_state go_state)
3338{
3339	switch (go_state) {
3340	case UNKNOWN_GO:
3341		return "unknown";
3342	case LOCAL_GO:
3343		return "local";
3344	case  REMOTE_GO:
3345		return "remote";
3346	}
3347
3348	return "??";
3349}
3350
3351
3352const struct p2p_peer_info * p2p_get_peer_info(struct p2p_data *p2p,
3353					       const u8 *addr, int next)
3354{
3355	struct p2p_device *dev;
3356
3357	if (addr)
3358		dev = p2p_get_device(p2p, addr);
3359	else
3360		dev = dl_list_first(&p2p->devices, struct p2p_device, list);
3361
3362	if (dev && next) {
3363		dev = dl_list_first(&dev->list, struct p2p_device, list);
3364		if (&dev->list == &p2p->devices)
3365			dev = NULL;
3366	}
3367
3368	if (dev == NULL)
3369		return NULL;
3370
3371	return &dev->info;
3372}
3373
3374
3375int p2p_get_peer_info_txt(const struct p2p_peer_info *info,
3376			  char *buf, size_t buflen)
3377{
3378	struct p2p_device *dev;
3379	int res;
3380	char *pos, *end;
3381	struct os_time now;
3382
3383	if (info == NULL)
3384		return -1;
3385
3386	dev = (struct p2p_device *) (((u8 *) info) -
3387				     offsetof(struct p2p_device, info));
3388
3389	pos = buf;
3390	end = buf + buflen;
3391
3392	os_get_time(&now);
3393	res = os_snprintf(pos, end - pos,
3394			  "age=%d\n"
3395			  "listen_freq=%d\n"
3396			  "wps_method=%s\n"
3397			  "interface_addr=" MACSTR "\n"
3398			  "member_in_go_dev=" MACSTR "\n"
3399			  "member_in_go_iface=" MACSTR "\n"
3400			  "go_neg_req_sent=%d\n"
3401			  "go_state=%s\n"
3402			  "dialog_token=%u\n"
3403			  "intended_addr=" MACSTR "\n"
3404			  "country=%c%c\n"
3405			  "oper_freq=%d\n"
3406			  "req_config_methods=0x%x\n"
3407			  "flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\n"
3408			  "status=%d\n"
3409			  "wait_count=%u\n"
3410			  "invitation_reqs=%u\n",
3411			  (int) (now.sec - dev->last_seen.sec),
3412			  dev->listen_freq,
3413			  p2p_wps_method_text(dev->wps_method),
3414			  MAC2STR(dev->interface_addr),
3415			  MAC2STR(dev->member_in_go_dev),
3416			  MAC2STR(dev->member_in_go_iface),
3417			  dev->go_neg_req_sent,
3418			  p2p_go_state_text(dev->go_state),
3419			  dev->dialog_token,
3420			  MAC2STR(dev->intended_addr),
3421			  dev->country[0] ? dev->country[0] : '_',
3422			  dev->country[1] ? dev->country[1] : '_',
3423			  dev->oper_freq,
3424			  dev->req_config_methods,
3425			  dev->flags & P2P_DEV_PROBE_REQ_ONLY ?
3426			  "[PROBE_REQ_ONLY]" : "",
3427			  dev->flags & P2P_DEV_REPORTED ? "[REPORTED]" : "",
3428			  dev->flags & P2P_DEV_NOT_YET_READY ?
3429			  "[NOT_YET_READY]" : "",
3430			  dev->flags & P2P_DEV_SD_INFO ? "[SD_INFO]" : "",
3431			  dev->flags & P2P_DEV_SD_SCHEDULE ? "[SD_SCHEDULE]" :
3432			  "",
3433			  dev->flags & P2P_DEV_PD_PEER_DISPLAY ?
3434			  "[PD_PEER_DISPLAY]" : "",
3435			  dev->flags & P2P_DEV_PD_PEER_KEYPAD ?
3436			  "[PD_PEER_KEYPAD]" : "",
3437			  dev->flags & P2P_DEV_USER_REJECTED ?
3438			  "[USER_REJECTED]" : "",
3439			  dev->flags & P2P_DEV_PEER_WAITING_RESPONSE ?
3440			  "[PEER_WAITING_RESPONSE]" : "",
3441			  dev->flags & P2P_DEV_PREFER_PERSISTENT_GROUP ?
3442			  "[PREFER_PERSISTENT_GROUP]" : "",
3443			  dev->flags & P2P_DEV_WAIT_GO_NEG_RESPONSE ?
3444			  "[WAIT_GO_NEG_RESPONSE]" : "",
3445			  dev->flags & P2P_DEV_WAIT_GO_NEG_CONFIRM ?
3446			  "[WAIT_GO_NEG_CONFIRM]" : "",
3447			  dev->flags & P2P_DEV_GROUP_CLIENT_ONLY ?
3448			  "[GROUP_CLIENT_ONLY]" : "",
3449			  dev->flags & P2P_DEV_FORCE_FREQ ?
3450			  "[FORCE_FREQ]" : "",
3451			  dev->flags & P2P_DEV_PD_FOR_JOIN ?
3452			  "[PD_FOR_JOIN]" : "",
3453			  dev->status,
3454			  dev->wait_count,
3455			  dev->invitation_reqs);
3456	if (res < 0 || res >= end - pos)
3457		return pos - buf;
3458	pos += res;
3459
3460	if (dev->ext_listen_period) {
3461		res = os_snprintf(pos, end - pos,
3462				  "ext_listen_period=%u\n"
3463				  "ext_listen_interval=%u\n",
3464				  dev->ext_listen_period,
3465				  dev->ext_listen_interval);
3466		if (res < 0 || res >= end - pos)
3467			return pos - buf;
3468		pos += res;
3469	}
3470
3471	if (dev->oper_ssid_len) {
3472		res = os_snprintf(pos, end - pos,
3473				  "oper_ssid=%s\n",
3474				  wpa_ssid_txt(dev->oper_ssid,
3475					       dev->oper_ssid_len));
3476		if (res < 0 || res >= end - pos)
3477			return pos - buf;
3478		pos += res;
3479	}
3480
3481	return pos - buf;
3482}
3483
3484
3485int p2p_peer_known(struct p2p_data *p2p, const u8 *addr)
3486{
3487	return p2p_get_device(p2p, addr) != NULL;
3488}
3489
3490
3491void p2p_set_client_discoverability(struct p2p_data *p2p, int enabled)
3492{
3493	if (enabled) {
3494		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
3495			"discoverability enabled");
3496		p2p->dev_capab |= P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3497	} else {
3498		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Client "
3499			"discoverability disabled");
3500		p2p->dev_capab &= ~P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY;
3501	}
3502}
3503
3504
3505static struct wpabuf * p2p_build_presence_req(u32 duration1, u32 interval1,
3506					      u32 duration2, u32 interval2)
3507{
3508	struct wpabuf *req;
3509	struct p2p_noa_desc desc1, desc2, *ptr1 = NULL, *ptr2 = NULL;
3510	u8 *len;
3511
3512	req = wpabuf_alloc(100);
3513	if (req == NULL)
3514		return NULL;
3515
3516	if (duration1 || interval1) {
3517		os_memset(&desc1, 0, sizeof(desc1));
3518		desc1.count_type = 1;
3519		desc1.duration = duration1;
3520		desc1.interval = interval1;
3521		ptr1 = &desc1;
3522
3523		if (duration2 || interval2) {
3524			os_memset(&desc2, 0, sizeof(desc2));
3525			desc2.count_type = 2;
3526			desc2.duration = duration2;
3527			desc2.interval = interval2;
3528			ptr2 = &desc2;
3529		}
3530	}
3531
3532	p2p_buf_add_action_hdr(req, P2P_PRESENCE_REQ, 1);
3533	len = p2p_buf_add_ie_hdr(req);
3534	p2p_buf_add_noa(req, 0, 0, 0, ptr1, ptr2);
3535	p2p_buf_update_ie_hdr(req, len);
3536
3537	return req;
3538}
3539
3540
3541int p2p_presence_req(struct p2p_data *p2p, const u8 *go_interface_addr,
3542		     const u8 *own_interface_addr, unsigned int freq,
3543		     u32 duration1, u32 interval1, u32 duration2,
3544		     u32 interval2)
3545{
3546	struct wpabuf *req;
3547
3548	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Send Presence Request to "
3549		"GO " MACSTR " (own interface " MACSTR ") freq=%u dur1=%u "
3550		"int1=%u dur2=%u int2=%u",
3551		MAC2STR(go_interface_addr), MAC2STR(own_interface_addr),
3552		freq, duration1, interval1, duration2, interval2);
3553
3554	req = p2p_build_presence_req(duration1, interval1, duration2,
3555				     interval2);
3556	if (req == NULL)
3557		return -1;
3558
3559	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3560	if (p2p_send_action(p2p, freq, go_interface_addr, own_interface_addr,
3561			    go_interface_addr,
3562			    wpabuf_head(req), wpabuf_len(req), 200) < 0) {
3563		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3564			"P2P: Failed to send Action frame");
3565	}
3566	wpabuf_free(req);
3567
3568	return 0;
3569}
3570
3571
3572static struct wpabuf * p2p_build_presence_resp(u8 status, const u8 *noa,
3573					       size_t noa_len, u8 dialog_token)
3574{
3575	struct wpabuf *resp;
3576	u8 *len;
3577
3578	resp = wpabuf_alloc(100 + noa_len);
3579	if (resp == NULL)
3580		return NULL;
3581
3582	p2p_buf_add_action_hdr(resp, P2P_PRESENCE_RESP, dialog_token);
3583	len = p2p_buf_add_ie_hdr(resp);
3584	p2p_buf_add_status(resp, status);
3585	if (noa) {
3586		wpabuf_put_u8(resp, P2P_ATTR_NOTICE_OF_ABSENCE);
3587		wpabuf_put_le16(resp, noa_len);
3588		wpabuf_put_data(resp, noa, noa_len);
3589	} else
3590		p2p_buf_add_noa(resp, 0, 0, 0, NULL, NULL);
3591	p2p_buf_update_ie_hdr(resp, len);
3592
3593	return resp;
3594}
3595
3596
3597static void p2p_process_presence_req(struct p2p_data *p2p, const u8 *da,
3598				     const u8 *sa, const u8 *data, size_t len,
3599				     int rx_freq)
3600{
3601	struct p2p_message msg;
3602	u8 status;
3603	struct wpabuf *resp;
3604	size_t g;
3605	struct p2p_group *group = NULL;
3606	int parsed = 0;
3607	u8 noa[50];
3608	int noa_len;
3609
3610	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3611		"P2P: Received P2P Action - P2P Presence Request");
3612
3613	for (g = 0; g < p2p->num_groups; g++) {
3614		if (os_memcmp(da, p2p_group_get_interface_addr(p2p->groups[g]),
3615			      ETH_ALEN) == 0) {
3616			group = p2p->groups[g];
3617			break;
3618		}
3619	}
3620	if (group == NULL) {
3621		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3622			"P2P: Ignore P2P Presence Request for unknown group "
3623			MACSTR, MAC2STR(da));
3624		return;
3625	}
3626
3627	if (p2p_parse(data, len, &msg) < 0) {
3628		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3629			"P2P: Failed to parse P2P Presence Request");
3630		status = P2P_SC_FAIL_INVALID_PARAMS;
3631		goto fail;
3632	}
3633	parsed = 1;
3634
3635	if (msg.noa == NULL) {
3636		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3637			"P2P: No NoA attribute in P2P Presence Request");
3638		status = P2P_SC_FAIL_INVALID_PARAMS;
3639		goto fail;
3640	}
3641
3642	status = p2p_group_presence_req(group, sa, msg.noa, msg.noa_len);
3643
3644fail:
3645	if (p2p->cfg->get_noa)
3646		noa_len = p2p->cfg->get_noa(p2p->cfg->cb_ctx, da, noa,
3647					    sizeof(noa));
3648	else
3649		noa_len = -1;
3650	resp = p2p_build_presence_resp(status, noa_len > 0 ? noa : NULL,
3651				       noa_len > 0 ? noa_len : 0,
3652				       msg.dialog_token);
3653	if (parsed)
3654		p2p_parse_free(&msg);
3655	if (resp == NULL)
3656		return;
3657
3658	p2p->pending_action_state = P2P_NO_PENDING_ACTION;
3659	if (p2p_send_action(p2p, rx_freq, sa, da, da,
3660			    wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
3661		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3662			"P2P: Failed to send Action frame");
3663	}
3664	wpabuf_free(resp);
3665}
3666
3667
3668static void p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da,
3669				      const u8 *sa, const u8 *data, size_t len)
3670{
3671	struct p2p_message msg;
3672
3673	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3674		"P2P: Received P2P Action - P2P Presence Response");
3675
3676	if (p2p_parse(data, len, &msg) < 0) {
3677		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3678			"P2P: Failed to parse P2P Presence Response");
3679		return;
3680	}
3681
3682	if (msg.status == NULL || msg.noa == NULL) {
3683		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3684			"P2P: No Status or NoA attribute in P2P Presence "
3685			"Response");
3686		p2p_parse_free(&msg);
3687		return;
3688	}
3689
3690	if (*msg.status) {
3691		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3692			"P2P: P2P Presence Request was rejected: status %u",
3693			*msg.status);
3694		p2p_parse_free(&msg);
3695		return;
3696	}
3697
3698	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3699		"P2P: P2P Presence Request was accepted");
3700	wpa_hexdump(MSG_DEBUG, "P2P: P2P Presence Response - NoA",
3701		    msg.noa, msg.noa_len);
3702	/* TODO: process NoA */
3703	p2p_parse_free(&msg);
3704}
3705
3706
3707static void p2p_ext_listen_timeout(void *eloop_ctx, void *timeout_ctx)
3708{
3709	struct p2p_data *p2p = eloop_ctx;
3710
3711	if (p2p->ext_listen_interval) {
3712		/* Schedule next extended listen timeout */
3713		eloop_register_timeout(p2p->ext_listen_interval_sec,
3714				       p2p->ext_listen_interval_usec,
3715				       p2p_ext_listen_timeout, p2p, NULL);
3716	}
3717
3718	if (p2p->state == P2P_LISTEN_ONLY && p2p->ext_listen_only) {
3719		/*
3720		 * This should not really happen, but it looks like the Listen
3721		 * command may fail is something else (e.g., a scan) was
3722		 * running at an inconvenient time. As a workaround, allow new
3723		 * Extended Listen operation to be started.
3724		 */
3725		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Previous "
3726			"Extended Listen operation had not been completed - "
3727			"try again");
3728		p2p->ext_listen_only = 0;
3729		p2p_set_state(p2p, P2P_IDLE);
3730	}
3731
3732	if (p2p->state != P2P_IDLE) {
3733		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Skip Extended "
3734			"Listen timeout in active state (%s)",
3735			p2p_state_txt(p2p->state));
3736		return;
3737	}
3738
3739	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Extended Listen timeout");
3740	p2p->ext_listen_only = 1;
3741	if (p2p_listen(p2p, p2p->ext_listen_period) < 0) {
3742		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Failed to start "
3743			"Listen state for Extended Listen Timing");
3744		p2p->ext_listen_only = 0;
3745	}
3746}
3747
3748
3749int p2p_ext_listen(struct p2p_data *p2p, unsigned int period,
3750		   unsigned int interval)
3751{
3752	if (period > 65535 || interval > 65535 || period > interval ||
3753	    (period == 0 && interval > 0) || (period > 0 && interval == 0)) {
3754		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3755			"P2P: Invalid Extended Listen Timing request: "
3756			"period=%u interval=%u", period, interval);
3757		return -1;
3758	}
3759
3760	eloop_cancel_timeout(p2p_ext_listen_timeout, p2p, NULL);
3761
3762	if (interval == 0) {
3763		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3764			"P2P: Disabling Extended Listen Timing");
3765		p2p->ext_listen_period = 0;
3766		p2p->ext_listen_interval = 0;
3767		return 0;
3768	}
3769
3770	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
3771		"P2P: Enabling Extended Listen Timing: period %u msec, "
3772		"interval %u msec", period, interval);
3773	p2p->ext_listen_period = period;
3774	p2p->ext_listen_interval = interval;
3775	p2p->ext_listen_interval_sec = interval / 1000;
3776	p2p->ext_listen_interval_usec = (interval % 1000) * 1000;
3777
3778	eloop_register_timeout(p2p->ext_listen_interval_sec,
3779			       p2p->ext_listen_interval_usec,
3780			       p2p_ext_listen_timeout, p2p, NULL);
3781
3782	return 0;
3783}
3784
3785
3786void p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
3787		      const u8 *ie, size_t ie_len)
3788{
3789	struct p2p_message msg;
3790
3791	if (bssid == NULL || ie == NULL)
3792		return;
3793
3794	os_memset(&msg, 0, sizeof(msg));
3795	if (p2p_parse_ies(ie, ie_len, &msg))
3796		return;
3797	if (msg.minor_reason_code == NULL)
3798		return;
3799
3800	wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
3801		"P2P: Deauthentication notification BSSID " MACSTR
3802		" reason_code=%u minor_reason_code=%u",
3803		MAC2STR(bssid), reason_code, *msg.minor_reason_code);
3804
3805	p2p_parse_free(&msg);
3806}
3807
3808
3809void p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code,
3810			const u8 *ie, size_t ie_len)
3811{
3812	struct p2p_message msg;
3813
3814	if (bssid == NULL || ie == NULL)
3815		return;
3816
3817	os_memset(&msg, 0, sizeof(msg));
3818	if (p2p_parse_ies(ie, ie_len, &msg))
3819		return;
3820	if (msg.minor_reason_code == NULL)
3821		return;
3822
3823	wpa_msg(p2p->cfg->msg_ctx, MSG_INFO,
3824		"P2P: Disassociation notification BSSID " MACSTR
3825		" reason_code=%u minor_reason_code=%u",
3826		MAC2STR(bssid), reason_code, *msg.minor_reason_code);
3827
3828	p2p_parse_free(&msg);
3829}
3830
3831
3832void p2p_set_managed_oper(struct p2p_data *p2p, int enabled)
3833{
3834	if (enabled) {
3835		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
3836			"Device operations enabled");
3837		p2p->dev_capab |= P2P_DEV_CAPAB_INFRA_MANAGED;
3838	} else {
3839		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Managed P2P "
3840			"Device operations disabled");
3841		p2p->dev_capab &= ~P2P_DEV_CAPAB_INFRA_MANAGED;
3842	}
3843}
3844
3845
3846int p2p_set_listen_channel(struct p2p_data *p2p, u8 reg_class, u8 channel)
3847{
3848	if (p2p_channel_to_freq(p2p->cfg->country, reg_class, channel) < 0)
3849		return -1;
3850
3851	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Set Listen channel: "
3852		"reg_class %u channel %u", reg_class, channel);
3853	p2p->cfg->reg_class = reg_class;
3854	p2p->cfg->channel = channel;
3855
3856	return 0;
3857}
3858
3859
3860int p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len)
3861{
3862	wpa_hexdump_ascii(MSG_DEBUG, "P2P: New SSID postfix", postfix, len);
3863	if (postfix == NULL) {
3864		p2p->cfg->ssid_postfix_len = 0;
3865		return 0;
3866	}
3867	if (len > sizeof(p2p->cfg->ssid_postfix))
3868		return -1;
3869	os_memcpy(p2p->cfg->ssid_postfix, postfix, len);
3870	p2p->cfg->ssid_postfix_len = len;
3871	return 0;
3872}
3873
3874
3875int p2p_set_oper_channel(struct p2p_data *p2p, u8 op_reg_class, u8 op_channel,
3876			 int cfg_op_channel)
3877{
3878	if (p2p_channel_to_freq(p2p->cfg->country, op_reg_class, op_channel)
3879	    < 0)
3880		return -1;
3881
3882	wpa_msg(p2p->cfg->msg_ctx, MSG_INFO, "P2P: Set Operating channel: "
3883		"reg_class %u channel %u", op_reg_class, op_channel);
3884	p2p->cfg->op_reg_class = op_reg_class;
3885	p2p->cfg->op_channel = op_channel;
3886	p2p->cfg->cfg_op_channel = cfg_op_channel;
3887	return 0;
3888}
3889
3890
3891int p2p_set_pref_chan(struct p2p_data *p2p, unsigned int num_pref_chan,
3892		      const struct p2p_channel *pref_chan)
3893{
3894	struct p2p_channel *n;
3895
3896	if (pref_chan) {
3897		n = os_malloc(num_pref_chan * sizeof(struct p2p_channel));
3898		if (n == NULL)
3899			return -1;
3900		os_memcpy(n, pref_chan,
3901			  num_pref_chan * sizeof(struct p2p_channel));
3902	} else
3903		n = NULL;
3904
3905	os_free(p2p->cfg->pref_chan);
3906	p2p->cfg->pref_chan = n;
3907	p2p->cfg->num_pref_chan = num_pref_chan;
3908
3909	return 0;
3910}
3911
3912
3913int p2p_get_interface_addr(struct p2p_data *p2p, const u8 *dev_addr,
3914			   u8 *iface_addr)
3915{
3916	struct p2p_device *dev = p2p_get_device(p2p, dev_addr);
3917	if (dev == NULL || is_zero_ether_addr(dev->interface_addr))
3918		return -1;
3919	os_memcpy(iface_addr, dev->interface_addr, ETH_ALEN);
3920	return 0;
3921}
3922
3923
3924int p2p_get_dev_addr(struct p2p_data *p2p, const u8 *iface_addr,
3925			   u8 *dev_addr)
3926{
3927	struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
3928	if (dev == NULL)
3929		return -1;
3930	os_memcpy(dev_addr, dev->info.p2p_device_addr, ETH_ALEN);
3931	return 0;
3932}
3933
3934
3935void p2p_set_peer_filter(struct p2p_data *p2p, const u8 *addr)
3936{
3937	os_memcpy(p2p->peer_filter, addr, ETH_ALEN);
3938	if (is_zero_ether_addr(p2p->peer_filter))
3939		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Disable peer "
3940			"filter");
3941	else
3942		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Enable peer "
3943			"filter for " MACSTR, MAC2STR(p2p->peer_filter));
3944}
3945
3946
3947void p2p_set_cross_connect(struct p2p_data *p2p, int enabled)
3948{
3949	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Cross connection %s",
3950		enabled ? "enabled" : "disabled");
3951	if (p2p->cross_connect == enabled)
3952		return;
3953	p2p->cross_connect = enabled;
3954	/* TODO: may need to tear down any action group where we are GO(?) */
3955}
3956
3957
3958int p2p_get_oper_freq(struct p2p_data *p2p, const u8 *iface_addr)
3959{
3960	struct p2p_device *dev = p2p_get_device_interface(p2p, iface_addr);
3961	if (dev == NULL)
3962		return -1;
3963	if (dev->oper_freq <= 0)
3964		return -1;
3965	return dev->oper_freq;
3966}
3967
3968
3969void p2p_set_intra_bss_dist(struct p2p_data *p2p, int enabled)
3970{
3971	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Intra BSS distribution %s",
3972		enabled ? "enabled" : "disabled");
3973	p2p->cfg->p2p_intra_bss = enabled;
3974}
3975
3976
3977void p2p_update_channel_list(struct p2p_data *p2p, struct p2p_channels *chan)
3978{
3979	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Update channel list");
3980	os_memcpy(&p2p->cfg->channels, chan, sizeof(struct p2p_channels));
3981}
3982
3983
3984int p2p_send_action(struct p2p_data *p2p, unsigned int freq, const u8 *dst,
3985		    const u8 *src, const u8 *bssid, const u8 *buf,
3986		    size_t len, unsigned int wait_time)
3987{
3988	if (p2p->p2p_scan_running) {
3989		wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Delay Action "
3990			"frame TX until p2p_scan completes");
3991		if (p2p->after_scan_tx) {
3992			wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Dropped "
3993				"previous pending Action frame TX");
3994			os_free(p2p->after_scan_tx);
3995		}
3996		p2p->after_scan_tx = os_malloc(sizeof(*p2p->after_scan_tx) +
3997					       len);
3998		if (p2p->after_scan_tx == NULL)
3999			return -1;
4000		p2p->after_scan_tx->freq = freq;
4001		os_memcpy(p2p->after_scan_tx->dst, dst, ETH_ALEN);
4002		os_memcpy(p2p->after_scan_tx->src, src, ETH_ALEN);
4003		os_memcpy(p2p->after_scan_tx->bssid, bssid, ETH_ALEN);
4004		p2p->after_scan_tx->len = len;
4005		p2p->after_scan_tx->wait_time = wait_time;
4006		os_memcpy(p2p->after_scan_tx + 1, buf, len);
4007		return 0;
4008	}
4009
4010	return p2p->cfg->send_action(p2p->cfg->cb_ctx, freq, dst, src, bssid,
4011				     buf, len, wait_time);
4012}
4013
4014
4015void p2p_set_best_channels(struct p2p_data *p2p, int freq_24, int freq_5,
4016			   int freq_overall)
4017{
4018	wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG, "P2P: Best channel: 2.4 GHz: %d,"
4019		"  5 GHz: %d,  overall: %d", freq_24, freq_5, freq_overall);
4020	p2p->best_freq_24 = freq_24;
4021	p2p->best_freq_5 = freq_5;
4022	p2p->best_freq_overall = freq_overall;
4023}
4024
4025
4026const u8 * p2p_get_go_neg_peer(struct p2p_data *p2p)
4027{
4028	if (p2p == NULL || p2p->go_neg_peer == NULL)
4029		return NULL;
4030	return p2p->go_neg_peer->info.p2p_device_addr;
4031}
4032
4033
4034const struct p2p_peer_info *
4035p2p_get_peer_found(struct p2p_data *p2p, const u8 *addr, int next)
4036{
4037	struct p2p_device *dev;
4038
4039	if (addr) {
4040		dev = p2p_get_device(p2p, addr);
4041		if (!dev)
4042			return NULL;
4043
4044		if (!next) {
4045			if (dev->flags & P2P_DEV_PROBE_REQ_ONLY)
4046				return NULL;
4047
4048			return &dev->info;
4049		} else {
4050			do {
4051				dev = dl_list_first(&dev->list,
4052						    struct p2p_device,
4053						    list);
4054				if (&dev->list == &p2p->devices)
4055					return NULL;
4056			} while (dev->flags & P2P_DEV_PROBE_REQ_ONLY);
4057		}
4058	} else {
4059		dev = dl_list_first(&p2p->devices, struct p2p_device, list);
4060		if (!dev)
4061			return NULL;
4062		while (dev->flags & P2P_DEV_PROBE_REQ_ONLY) {
4063			dev = dl_list_first(&dev->list,
4064					    struct p2p_device,
4065					    list);
4066			if (&dev->list == &p2p->devices)
4067				return NULL;
4068		}
4069	}
4070
4071	return &dev->info;
4072}
4073
4074#ifdef ANDROID_P2P
4075int p2p_search_in_progress(struct p2p_data *p2p)
4076{
4077	if (p2p == NULL)
4078		return 0;
4079
4080	return p2p->state == P2P_SEARCH;
4081}
4082#endif
4083
4084int p2p_in_progress(struct p2p_data *p2p)
4085{
4086	if (p2p == NULL)
4087		return 0;
4088	return p2p->state != P2P_IDLE && p2p->state != P2P_PROVISIONING;
4089}
4090